官术网_书友最值得收藏!

Pentesting VPN's ike-scan

Often during a pentest we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well known method. VPN endpoints use Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.

IKE has two phases, phase 1 is responsible for setting up and establishing secure authenticated communication channel, and phase 2 encrypts and transports data.

Our focus of interest here would be phase 1; it uses two methods of exchanging keys:

  • Main mode
  • Aggressive mode

We will hunt for aggressive mode enabled VPN endpoints using PSK authentication.

主站蜘蛛池模板: 平南县| 康平县| 漠河县| 临漳县| 沙坪坝区| 涟水县| 南江县| 尚义县| 甘肃省| 延川县| 旬邑县| 平远县| 五寨县| 英吉沙县| 定西市| 新干县| 乌兰县| 晋江市| 于田县| 佛山市| 湟源县| 恭城| 湘潭县| 商南县| 互助| 南京市| 宝山区| 丹寨县| 隆昌县| 安仁县| 定兴县| 循化| 正宁县| 广州市| 白山市| 青海省| 石林| 锦州市| 江北区| 浙江省| 宜黄县|