[Silica] SILICA v7.42
oren at immunityinc.com
Mon Feb 1 18:52:23 UTC 2021
Immunity is proud to announce the release of SILICA v7.42!
- Blacklist filtering access points.
A blacklist filter menu option was added to load a list of BSSIDs that
will be ignored by SILICA when scanning for access points. This was a
- Updated documentation.
The documentation was updated and is available at
- Bug fix: The card was disconnecting after a while when scanning on
some Linux hosts.
The SILICA card was disconnecting from the host computer after a number
of channel changes when scanning for access points on some Linux hosts
due to a hardware or driver issue. To work around this, SILICA now asks
the kernel driver to scan a set of channels instead of performing each
channel change itself. This change also makes SILICA faster to switch
channels when scanning.
Videos can be found at:
WPA traffic decryption using the Kr00k Attack -
Network Printer Attacks -
Bypassing WPA2 encryption using the KRACK attack -
SILICA 7.31: Samba Server Exploitation -
D-link and Microsoft WSUS Exploits -
Fake Captive Portal Demo -
Malicious Access Point Detection -
Karma attack filtering and background WPA handshake sniffer -
Access Point Mapping - https://vimeo.com/157178038
Full Karma Attack - https://vimeo.com/155393829
SMB proxy and group policy exploit - https://vimeo.com/136964755
SSL attacks using SSL stripping and self signed certificates -
Pixie Dust WPS Attack - https://vimeo.com/130883860
More WPS attacks - https://vimeo.com/album/3385057/video/115337910
General overview -
Wireless Window -
More information about the SILICA