Skip to content

TechRepublic

  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Networking

Silica — a wireless hacking tool

By ryan naraine February 6, 2007, 10:58 AM PST

Image
1
of 10

Silica — a wireless hacking tool

Justine Aitel

Justine Aitel

Penetration testing firm Immunity has started shipping Silica, a wireless handheld pen-testing device capable of finding — and exploiting — security vulnerabilities.

The palm-sized PDA tucked away in Justine Aitel’s pocketbook just might be the most scary device on display at this year’s RSA security conference. [See Ryan Naraine’s report.] Aitel is roaming the hallways here with Silica, a portable hacking device that can search for and join 802.11 (Wi-Fi) access points, scan other connections for open ports, and automatically launch code execution exploits from a built-in exploit platform.

Silica is the brainchild of Aitel’s Immunity Inc., a 10-employee penetration testing outfit operating out of Miami Beach, Florida. It runs a customized version of CANVAS, the company’s flagship point-and-click attack tool that features hundreds of exploits, an automated exploitation system, and an exploit development framework.

Silica — a wireless hacking tool

PDA form factor

PDA form factor

Silica now runs on the Nokia 770 but Immunity plans to expand the range of supported devices.

Silica — a wireless hacking tool

Powered by Linux

Powered by Linux

Silica runs a customized installation of Debian/Linux running kernel 2.6.16 with preemptive scheduling.

Silica — a wireless hacking tool

Bluetooth support planned

Bluetooth support planned

Currently Silica supports 802.11 (Wi-Fi). The product roadmap calls for support for Bluetooth wireless connections and Ethernet via USB.

Silica — a wireless hacking tool

Touch screen application launch

Touch screen application launch

Once a network connection is established with a wireless access point, the user can use the touch-screen interface to launch Silica.

Silica — a wireless hacking tool

Connect to available networks

Connect to available networks

Silica scans for available Wi-Fi networks, then connects and starts scanning for vulnerable targets.

Silica — a wireless hacking tool

Attack, or prompt first?

Attack, or prompt first?

Available networks can be scanned in two modes — Attack mode or the “prompt before scan” mode. Both can be enabled at the same time.

Silica — a wireless hacking tool

Attack node prompt

Attack node prompt

The user can manually confirm the use of “attack node,” which fires exploits at vulnerable targets on the wireless network.

Silica — a wireless hacking tool

Three-button user interface

Three-button user interface

The application comes with a three-button user interface: Scan, Stop and Update.

windows10-pic10.png
windows10-pic10.png
Silica — a wireless hacking tool

Making progress

Image: Nick Heath / TechRepublic

Making progress

A progress bar should display what is happening on the device. Optionally, the user may check the two bottom status boxes to find out more details about the scan. rn

rnrnSee also: Ryan Naraine’s report from RSA 2007, Wi-Fi hacking, with a handheld PDA.

Image: Nick Heath / TechRepublic
  • Networking
  • Account Information

    Share with Your Friends

    Silica — a wireless hacking tool

    Your email has been sent

Share: Silica -- a wireless hacking tool
Image of ryan naraine
By ryan naraine
  • Account Information

    Contact ryan naraine

    Your message has been sent

  • |
  • See all of ryan's content

Daily Tech Insider

If you can only read one tech story a day, this is it.

TechRepublic Premium

  • TechRepublic Premium

    Remote Device Management and Wiping Policy

    The purpose of this policy from TechRepublic Premium is to establish guidelines for the remote management and wiping of personal devices used in a bring your own device program. This policy aims to ensure the protection of sensitive company data in the event of security breaches, device loss, theft or termination of employment or contract. ...

    Downloads
    Published:  December 10, 2023, 4:00 PM EST Modified:  December 11, 2023, 8:01 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Incident Reporting and Response Procedures Policy

    The purpose of the Incident Reporting and Response Procedures Policy from TechRepublic Premium is to establish a clear and efficient process for employees to report security breaches, device loss, or data exposure incidents involving personal devices used for work purposes. From the policy: CONFIDENTIAL REPORTING Employees are strongly encouraged to promptly report incidents, and they ...

    Downloads
    Published:  December 7, 2023, 4:00 PM EST Modified:  December 8, 2023, 8:02 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Cryptocurrency

    Cryptocurrency is a popular technological worldwide trend. As with any investing avenue, the revenue one can make dealing in cryptocurrency can vary depending on the time put into the endeavors, market fluctuation, choice of investments, available capital, how loss averse you are, your short- and long-term strategies and other traditional investment factors. Be forewarned, scams ...

    Published:  December 6, 2023, 4:00 PM EST Modified:  December 7, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    What Is Artificial General Intelligence?

    Artificial general intelligence, or AGI, is a hypothetical form of AI designed to perform human-level cognitive functions, such as the capacity to self-teach. AGI is regarded as very powerful since it can autonomously solve a wide variety of cognitive tasks, as opposed to weak or narrow AI systems that carry out only particular or specialized ...

    Downloads
    Published:  December 6, 2023, 4:00 PM EST Modified:  December 7, 2023, 7:51 AM EST Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • Editorial Policy
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice
CLOSE

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

Already registered? Sign In
Use Facebook
Use Linkedin

* - indicates required fields

CLOSE

Sign in to TechRepublic

Not a member? Create an account
Use Facebook
Use Linkedin

Lost your password? Request a new password

CLOSE

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support.

Back to login
1 Finish Profile
2 Newsletter Preferences
CLOSE

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

No thanks, continue without
1 Finish Profile
2 Newsletter Preferences
CLOSE

Want to receive more TechRepublic news?

Newsletter Name
Subscribe
Daily Tech Insider
Daily Tech Insider AU
TechRepublic UK
TechRepublic News and Special Offers
TechRepublic News and Special Offers International
Executive Briefing
Innovation Insider
Project Management Insider
Microsoft Weekly
Cloud Insider
Data Insider
Developer Insider
TechRepublic Premium
Apple Weekly
Cybersecurity Insider
Google Weekly
Toggle All
No thanks, continue without

You're All Set

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add newsletters@nl.technologyadvice.com to your contacts list.

Back to Home Page