官术网_书友最值得收藏!

Pentesting VPN's ike-scan

Often during a pentest we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well known method. VPN endpoints use Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.

IKE has two phases, phase 1 is responsible for setting up and establishing secure authenticated communication channel, and phase 2 encrypts and transports data.

Our focus of interest here would be phase 1; it uses two methods of exchanging keys:

  • Main mode
  • Aggressive mode

We will hunt for aggressive mode enabled VPN endpoints using PSK authentication.

主站蜘蛛池模板: 门源| 璧山县| 同仁县| 兴义市| 大兴区| 江油市| 东乡| 宁国市| 仙桃市| 孙吴县| 新巴尔虎左旗| 都兰县| 乌兰浩特市| 封丘县| 常德市| 乐安县| 托克托县| 偏关县| 嘉义县| 陇南市| 鹰潭市| 北宁市| 太保市| 金昌市| 三原县| 临泽县| 和田县| 栾川县| 东阳市| 奈曼旗| 广宗县| 什邡市| 东港市| 耒阳市| 扶余县| 沁源县| 广饶县| 仪征市| 乐昌市| 苗栗县| 泰州市|