Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Silica -- a wireless hacking tool

4 of 10 NEXT PREV
  • 53778.jpg

    Penetration testing firm Immunity has started shipping Silica, a wireless handheld pen-testing device capable of finding -- and exploiting -- security vulnerabilities.

    The palm-sized PDA tucked away in Justine Aitel's pocketbook just might be the most scary device on display at this year's RSA security conference. [See Ryan Naraine's report.] Aitel is roaming the hallways here with Silica, a portable hacking device that can search for and join 802.11 (Wi-Fi) access points, scan other connections for open ports, and automatically launch code execution exploits from a built-in exploit platform.



    Silica is the brainchild of Aitel's Immunity Inc., a 10-employee penetration testing outfit operating out of Miami Beach, Florida. It runs a customized version of CANVAS, the company's flagship point-and-click attack tool that features hundreds of exploits, an automated exploitation system, and an exploit development framework.
    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53851.jpg

    Silica now runs on the Nokia 770 but Immunity plans to expand the range of supported devices.

    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53809.jpg

    Silica runs a customized installation of Debian/Linux running kernel 2.6.16 with preemptive scheduling.

    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53810.jpg

    Currently Silica supports 802.11 (Wi-Fi). The product roadmap calls for support for Bluetooth wireless connections and Ethernet via USB.

    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53768.png

    Once a network connection is established with a wireless access point, the user can use the touch-screen interface to launch Silica.

    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53769.png

    Silica scans for available Wi-Fi networks, then connects and starts scanning for vulnerable targets.

    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53770.png

    Available networks can be scanned in two modes -- Attack mode or the "prompt before scan" mode. Both can be enabled at the same time.

    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53771.png

    The user can manually confirm the use of "attack node," which fires exploits at vulnerable targets on the wireless network.

    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53776.png

    The application comes with a three-button user interface: Scan, Stop and Update.

    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

  • 53777.png

    A progress bar should display what is happening on the device. Optionally, the user may check the two bottom status boxes to find out more details about the scan.

    See also: Ryan Naraine's report from RSA 2007, Wi-Fi hacking, with a handheld PDA.
    Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

    Caption by: Ryan Naraine

4 of 10 NEXT PREV
Ryan Naraine

By Ryan Naraine | February 7, 2007 -- 13:54 GMT (05:54 PST) | Topic: Security

  • 53778.jpg
  • 53851.jpg
  • 53809.jpg
  • 53810.jpg
  • 53768.png
  • 53769.png
  • 53770.png
  • 53771.png
  • 53776.png
  • 53777.png

Penetration testing firm Immunity has started shipping Silica, a wireless handheld pen-testing device capable of finding -- and exploiting -- security vulnerabilities.

Read More Read Less

Currently Silica supports 802.11 (Wi-Fi). The product roadmap calls for support for Bluetooth wireless connections and Ethernet via USB.

Published: February 7, 2007 -- 13:54 GMT (05:54 PST)

Caption by: Ryan Naraine

4 of 10 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Ryan Naraine

By Ryan Naraine | February 7, 2007 -- 13:54 GMT (05:54 PST) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • OnlyKey hardware security key

    This is the ultimate security key for professionals.

  • SoloKeys Solo V2

    Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.

  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums