![]() |
Silica hack "tester" perhaps too good at its job
QUOTE:
As if we didn't have enough cause to be paranoid about WiFi hacking, Justine Aitel has worked out a way to do it completely automatically -- your ports will never be safe again. Justine's Immunity Inc. has developed a tool it calls Silica, which runs a custom version of CANVAS, Immunity's point-and-click attack tool, on a Nokia 770: http://www.engadget.com/2007/02/09/s...od-at-its-job/ |
Re: Silica hack "tester" perhaps too good at its job
Never heard of it (again). You would have thought to search when posting about news from 7 months ago...
|
Re: Silica hack "tester" perhaps too good at its job
Old news. Again. I think we all know that all this "CANVAS" thing happens to be is a GUI frontend to a slew of command-line utilities (nmap, aircrack/airsnort, Metaspolit framework, etc.).
And it's nothing compared to the ~$25,000 monster from Fluke. I used to have one of those at work and it was GREAT at network troubleshooting, be it wired, wireless (a/b/g/n), or fiber. Real network admins use Fluke devices and a Linux box. |
Re: Silica hack "tester" perhaps too good at its job
Quote:
Don't forget the awesome bumble bee devices from the bvh systems guys. The canvas applications are really cool for showing users about bad passwords. The only saving grace with the Silica devices is their cost. Most skriddies can't afford one. |
Re: Silica hack "tester" perhaps too good at its job
Quote:
MetaSploit is a ruby-based exploitation framework. CANVAS is *not* a GUI front end to nmap, aircrack, Metasploit, etc. |
All times are GMT. The time now is 16:18. |
vBulletin® Version 3.8.8