[Silica] SILICA v7.43

oren at immunityinc.com oren at immunityinc.com
Tue Apr 20 13:11:47 UTC 2021

Immunity is proud to announce the release of SILICA v7.43!

- Known beacons attack 

 + Many modern operating systems are not vulnerable to standard "karma"
 attacks as they passively scan for known open networks instead of 
 broadcasting probe requests. In the "known beacons attack", beacons 
 advertising ESSIDs from a list of known common network names are 
 broadcasted. This attack is effective because many operating system 
 default to auto-connecting to known open networks. This attack has 
 been implemented in SILICA as an enhancement to the "karma" module, 
 and it is launched from the "FakeAP settings" dialog box. There is a 
 predefined common ESSIDs list, and a custom list can be loaded from 
 the "PREFERENCES/Module Config" dialog box.

- Improved Deauthentication Attack 

 + SILICA now supports deauthenticating all stations from a BSS even
 when another module is running. The attack is launched from the 
 "Network Listing" tab, by selecting the "DoS: Deauthenticate All 
 Clients". The only limitation is that if the attack is launched while 
 another module is running, then the target network must be in the 
 same channel as the current wireless channel. This improvement is 
 specially intended to be used together with the FakeAP module.  

- Probe Requests MAC Randomization Handling 

 + MAC randomization in probe requests was introduced by operating 
 system vendors to enhance privacy. As a result, SILICA probe 
 visualizations were confusing after scanning for a certain period, as 
 too many MAC addresses were displayed. SILICA now groups together 
 probe requests in the FakeAP tab by ESSID and hide the MAC address by 
 default. In the "Neighborhood Graph" visualization, SILICA groups 
 together MAC addresses that had only proved the same ESSID. MAC 
 address that were seen in other interactions are still displayed 

To view a demonstration of the new features visit:

Videos can be found at:
WPA traffic decryption using the Kr00k Attack -
Network Printer Attacks -
Bypassing WPA2 encryption using the KRACK attack -
SILICA 7.31: Samba Server Exploitation - 
D-link and Microsoft WSUS Exploits -
Fake Captive Portal Demo -
Malicious Access Point Detection -
Karma attack filtering and background WPA handshake sniffer -
Access Point Mapping - https://vimeo.com/157178038
Full Karma Attack - https://vimeo.com/155393829
SMB proxy and group policy exploit - https://vimeo.com/136964755
SSL attacks using SSL stripping and self signed certificates -
Exploiting Android WebView.addJavaScriptInterface -
Pixie Dust WPS Attack - https://vimeo.com/130883860
More WPS attacks - https://vimeo.com/album/3385057/video/115337910
General overview -
Wireless Window  -


More information about the SILICA mailing list