Thursday, September 25, 2008

Silica the wifi hacking hardware

HACK ANY COMPUTER VIA SILICA

A. Silica :-It is a device that uses “CANVAS” a software which uses to scan a WI-FI and launches the exploit code itself and connects to the system for the usage it uses a hand held PDA. It uses a immunity tablet of Nokia 770.but it can be customized for a large range of hardware devices. It works on the touch screen Technologies it can be handled in by a stylus. The stylus can launch the silica (hardware device) into the attack and then can be putted into yours pocket. It can run a drive-by-pen test .we can start it run a Scan connect to the WI-FI, run the exploit and get the html report that what is done.

B. Now about the cost Issues:-it makes a large buck to be settled in the Indian market it costs just for Rs 151,200($3,600). The matter will be the cost issues for my Indian Friends. And the company asks for the recognisation of the buyers identity, from where the money is coming in, and to whom and where the product it getting shipping in.

C. Some Example of the Silica Product:-
Tell the silica to scan the every device on every WI-FI networks for file sharing and that downloads anything of the internet to the device. Then just put it in your pocket and walk in to the workplace of your target. A. Silica :-It is a device that uses “CANVAS” a software which uses to scan a WI-FI and launches the exploit code itself and connects to the system for the usage it uses a hand held PDA. It uses a immunity tablet of Nokia 770.but it can be customized for a large range of hardware devices. It works on the touch screen Technologies it can be handled in by a stylus. The stylus can launch the silica (hardware device) into the attack and then can be putted into yours pocket. It can run a drive-by-pen test .we can start it run a Scan connect to the WI-FI, run the exploit and get the html report that what is done.

B. Now about the cost Issues:-it makes a large buck to be settled in the Indian market it costs just for Rs 151,200($3,600). The matter will be the cost issues for my Indian Friends. And the company asks for the recognisation of the buyers identity, from where the money is coming in, and to whom and where the product it getting shipping in.

C. Some Example of the Silica Product:-
Tell the silica to scan the every device on every WI-FI networks for file sharing and that downloads anything of the internet to the device. Then just put it in your pocket and walk in to the workplace of your target.

Tell silica to actively penetrate any machine it can target and have all the machines successfully penetrated machines connect via HTTP/DNS at an external listing port.

Mail silica to the Targets CEO, Then let it turn on and hack anything it can as it sits on the desk

Have the device conduct MITM (Man-in –The-Middle) attacks against the computer connected to wireless network.


Tell silica to actively penetrate any machine it can target and have all the machines successfully penetrated machines connect via HTTP/DNS at an external listing port.

Mail silica to the Targets CEO, Then let it turn on and hack anything it can as it sits on the desk

Have the device conduct MITM (Man-in –The-Middle) attacks against the computer connected to wireless network.

No comments: