- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 105字
- 2021-07-08 09:41:14
Pentesting VPN's ike-scan
Often during a pentest we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well known method. VPN endpoints use Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.
IKE has two phases, phase 1 is responsible for setting up and establishing secure authenticated communication channel, and phase 2 encrypts and transports data.
Our focus of interest here would be phase 1; it uses two methods of exchanging keys:
- Main mode
- Aggressive mode
We will hunt for aggressive mode enabled VPN endpoints using PSK authentication.
推薦閱讀
- PowerCLI Cookbook
- 跟小海龜學Python
- Building Cross-Platform Desktop Applications with Electron
- Mastering KnockoutJS
- Python完全自學教程
- Android開發案例教程與項目實戰(在線實驗+在線自測)
- Android系統級深入開發
- Visual Studio 2015高級編程(第6版)
- 高性能PHP 7
- Raspberry Pi Blueprints
- PHP Microservices
- 城市信息模型平臺頂層設計與實踐
- Internet of Things with Arduino Cookbook
- 計算機應用基礎
- C#.NET程序設計