- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 101字
- 2021-06-24 15:59:17
Pentesting VPN's ike-scan
During a pentest, we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well-known method. VPN endpoints use the Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.
IKE has two phases. Phase 1 is responsible for setting up and establishing a secure authenticated communication channel. Phase 2 encrypts and transports data.
Our focus of interest here is Phase 1. It uses two methods of exchanging keys:
- Main mode
- Aggressive mode
We hunt for Aggressive-mode-enabled VPN endpoints using PSK authentication.
推薦閱讀
- Linux運維之道(第3版)
- Ansible權威指南
- 嵌入式Linux系統開發:基于Yocto Project
- Extending Puppet
- Installing and Configuring Windows 10:70-698 Exam Guide
- Linux就該這么學
- 新手學電腦從入門到精通(Windows 10+Office 2016版)
- Linux自動化運維:Shell與Ansible(微課版)
- 8051軟核處理器設計實戰
- NetDevOps入門與實踐
- OpenSolaris設備驅動原理與開發
- Social Data Visualization with HTML5 and JavaScript
- Windows Vista終極技巧金典
- iOS 10快速開發:18天零基礎開發一個商業應用
- Linux從入門到精通(視頻教學版)