- Kali Linux:An Ethical Hacker's Cookbook(Second Edition)
- Himanshu Sharma
- 101字
- 2021-06-24 15:59:17
Pentesting VPN's ike-scan
During a pentest, we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well-known method. VPN endpoints use the Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.
IKE has two phases. Phase 1 is responsible for setting up and establishing a secure authenticated communication channel. Phase 2 encrypts and transports data.
Our focus of interest here is Phase 1. It uses two methods of exchanging keys:
- Main mode
- Aggressive mode
We hunt for Aggressive-mode-enabled VPN endpoints using PSK authentication.
推薦閱讀
- UNIX操作系統設計
- WordPress Mobile Web Development:Beginner's Guide
- 曝光:Linux企業運維實戰
- 異質結原理與器件
- Docker+Kubernetes應用開發與快速上云
- 計算機系統:基于x86+Linux平臺
- Django Project Blueprints
- Social Data Visualization with HTML5 and JavaScript
- AWS SysOps Cookbook
- Python UNIX和Linux系統管理指南
- Building Telephony Systems With Asterisk
- Linux 從入門到項目實踐(超值版)
- OpenHarmony開發與實踐:基于紅莓RK2206開發板
- Mastering Azure Serverless Computing
- Linux指令從初學到精通