- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 105字
- 2021-07-08 09:41:14
Pentesting VPN's ike-scan
Often during a pentest we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well known method. VPN endpoints use Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.
IKE has two phases, phase 1 is responsible for setting up and establishing secure authenticated communication channel, and phase 2 encrypts and transports data.
Our focus of interest here would be phase 1; it uses two methods of exchanging keys:
- Main mode
- Aggressive mode
We will hunt for aggressive mode enabled VPN endpoints using PSK authentication.
推薦閱讀
- Web應(yīng)用系統(tǒng)開發(fā)實(shí)踐(C#)
- Mobile Web Performance Optimization
- Pandas Cookbook
- 跟“龍哥”學(xué)C語言編程
- Android Development with Kotlin
- C語言程序設(shè)計基礎(chǔ)與實(shí)驗指導(dǎo)
- SQL Server 2012數(shù)據(jù)庫管理與開發(fā)項目教程
- TradeStation交易應(yīng)用實(shí)踐:量化方法構(gòu)建贏家策略(原書第2版)
- ASP.NET程序設(shè)計教程
- Scala for Machine Learning(Second Edition)
- Machine Learning With Go
- Learning Nessus for Penetration Testing
- Instant Automapper
- Java Web開發(fā)基礎(chǔ)與案例教程
- Building a Media Center with Raspberry Pi