[Silica] SILICA v7.29

Oren Isacson oren at immunityinc.com
Mon Mar 20 15:30:19 EDT 2017

Immunity is proud to announce the release of SILICA v7.29!

* Windows Server Update Services (WSUS) MiTM Attack
  A new attack module that performs a man-in-the-middle attack against
  windows stations using non-SSL connections to WSUS. This module is
  active when running the fake AP with client-side injection mode.

* D-link authentication bypass
  Multiple D-link access points are vulnerable to an authentication
  bypass [1].  The "attack" module will scan for the vulnerability and
  open a browser session to the administration interface if the attack
  is successful.

* Deauthentication of wireless clients
  A new option was added to deauthenticate a specific station from a
  wireless network. This can be useful to try to force a target to
  connect to the fake AP.

* A new option was also added to select the channel used by the fake AP.

* In addition, several fixes are included:
  Issue with packet injection in MiTM mode with client-side injection.
  Issue with network listing information display when an AP
  configuration is changed.

[1] http://seclists.org/bugtraq/2010/Nov/90

To view a demonstration of these new features visit:


Other videos can be found at:

Fake Captive Portal Demo -
Malicious Access Point Detection -
Karma attack filtering and background WPA handshake sniffer -
Access Point Mapping - https://vimeo.com/157178038
Full Karma Attack - https://vimeo.com/155393829
SMB proxy and group policy exploit - https://vimeo.com/136964755
SSL attacks using SSL stripping and self signed certificates -
Exploiting Android WebView.addJavaScriptInterface -
Pixie Dust WPS Attack - https://vimeo.com/130883860
More WPS attacks - https://vimeo.com/album/3385057/video/115337910
General overview -
Wireless Window  -


More information about the SILICA mailing list