Immunity SILICA 7.45

$250.00

SILICA is a wireless security vulnerability assessment and penetration tool. It simplifies the task of scanning your wireless networks and WiFi-enabled devices as it integrates a large number of WiFi specific attacks with a user friendly graphical interface.

Category:

Description

Understanding the vulnerabilities of your WiFi network can be challenging as users can easily create networks on demand, or even perhaps unintentionally. But as recent events have demonstrated, scanning your WiFi network is an important part of understanding your security posture.

Most vulnerability assessment tools simply take their current network scanners and point them at the wireless infrastructure. This approach does not give you the information that is unique to wireless networks. Immunity has built the first automated, WiFi specific, vulnerability assessment and penetration tool.

With SILICA You Can:
  • Recover WEP, WPA 1,2 and LEAP keys
  • Passively hijack web application sessions for email, social networking and Intranet sites.
  • Map a wireless network and identify its relationships with associated clients and other access points.
  • Identify vendors, hidden SSIDs and equipment passively.
  • Scan and break into hosts on the network using integrated CANVAS exploit modules and commands to recover screenshots, password hashes and other sensitive information.
  • Perform man-in-the-middle attacks to find valuable information exchanged between hosts.
  • Generate reports for wireless and network data.
  • Hijack wireless client connections via access point impersonation.
  • Passively inject custom content into client’s web sessions.
  • Take full control of wireless clients via CANVAS’s client-side exploitation framework (clientD).
  • Decrypt and easily view all WEP and WPA 1/2 traffic.
HIPAA Typical SILICA users include:
  • Forensics teams working to re-create an incident.
  • Security Management teams that want a purpose-build vulnerability scanning and exploitation tool for their WiFi network, including remote identification of systems and mobile devices even when running personal firewalls.
  • Network administrators who want to discover ad-hoc, unauthorized clients, or weakly authenticated WiFi access points, and to test/recover WEP, LEAP and WPA 1,2 keys.
  • Compliance officers looking for real risk management profiles.
  • Security Assessment teams that are tired of the false positives from traditional scanners use SILICA’s man-in-the-middle and aggressive remote exploitation capability.
SILICA Product Features
  • Access Point recon and analysis
  • Automated client discovery
  • Access Point exploits
  • Automated exploit launch and run
  • Automated SSID discovery
  • WEP, WPA 1/2 and LEAP credential recovery
  • WPS attacks, including offline bruteforcing
  • Man-In-The-Middle capability
  • Fake AP attacks, including KARMA, SSL-Strip, Spoofed Certificates and Service Impersonation
  • Browser Session Hijacking
  • Number of hosts analyzed simultaneously: 256
  • Average time to compromise a host: < 1 minute
  • Average time to break a WEP network: 10 minutes
  • Average time to break a LEAP, WPA 1/2 network: depends on key strength
  • Report Format: HTML, DOCX
  • Report retrieval: USB
  • Frequency ranges: 802.11 a/b/g/n
  • Installation: Virtual Machine
  • Wireless cards: Panda Wireless PAU09 N600 Dual-Band Wireless USB Adapter (included)

Reviews

There are no reviews yet.

Be the first to review “Immunity SILICA 7.45”

Your email address will not be published. Required fields are marked *