官术网_书友最值得收藏!

Pentesting VPN's ike-scan

During a pentest, we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well-known method. VPN endpoints use the Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.

IKE has two phases. Phase 1 is responsible for setting up and establishing a secure authenticated communication channel. Phase 2 encrypts and transports data.

Our focus of interest here is Phase 1. It uses two methods of exchanging keys:

  • Main mode
  • Aggressive mode

We hunt for Aggressive-mode-enabled VPN endpoints using PSK authentication.

主站蜘蛛池模板: 柏乡县| 福州市| 西吉县| 绥宁县| 汉沽区| 安徽省| 萍乡市| 邳州市| 永德县| 鹿泉市| 瑞安市| 宁蒗| 临桂县| 西畴县| 清涧县| 双流县| 铜梁县| 威远县| 临武县| 社旗县| 普兰店市| 福鼎市| 阿巴嘎旗| 昔阳县| 遵化市| 资中县| 西丰县| 漳州市| 永吉县| 楚雄市| 滕州市| 尖扎县| 公安县| 高碑店市| 定西市| 福安市| 横山县| 栾川县| 文山县| 花莲市| 漳平市|