Executable replacement: This new fake AP capability allows for new attack
possibilities. In this release, it intercepts executables downloaded by
stations and replaces them with backdoors (Works on Windows, Linux and OSX)
Improved WPS attack: SILICA will exploit default PINs for vulnerable
access points before brute-forcing, including trying some algorithm that
will obtain the PIN out of the Access Point features (such as the MAC).