官术网_书友最值得收藏!

Pentesting VPN's ike-scan

During a pentest, we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well-known method. VPN endpoints use the Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.

IKE has two phases. Phase 1 is responsible for setting up and establishing a secure authenticated communication channel. Phase 2 encrypts and transports data.

Our focus of interest here is Phase 1. It uses two methods of exchanging keys:

  • Main mode
  • Aggressive mode

We hunt for Aggressive-mode-enabled VPN endpoints using PSK authentication.

主站蜘蛛池模板: 分宜县| 射阳县| 汕头市| 延安市| 广河县| 积石山| 梁河县| 咸丰县| 孟村| 建德市| 洛宁县| 天台县| 绍兴市| 班戈县| 衡南县| 高陵县| 东安县| 阿拉善右旗| 珲春市| 滁州市| 大荔县| 波密县| 长兴县| 凤山县| 西畴县| 阿勒泰市| 溆浦县| 荥经县| 西安市| 镇雄县| 肇庆市| 隆尧县| 确山县| 古浪县| 项城市| 瑞安市| 恩施市| 潮州市| 于都县| 龙海市| 祁门县|