官术网_书友最值得收藏!

Pentesting VPN's ike-scan

During a pentest, we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well-known method. VPN endpoints use the Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.

IKE has two phases. Phase 1 is responsible for setting up and establishing a secure authenticated communication channel. Phase 2 encrypts and transports data.

Our focus of interest here is Phase 1. It uses two methods of exchanging keys:

  • Main mode
  • Aggressive mode

We hunt for Aggressive-mode-enabled VPN endpoints using PSK authentication.

主站蜘蛛池模板: 师宗县| 芷江| 密山市| 邓州市| 蓝山县| 黄冈市| 平塘县| 子长县| 镇原县| 凤凰县| 方山县| 紫阳县| 鹤壁市| 大关县| 临江市| 崇文区| 武夷山市| 上饶县| 富民县| 锡林浩特市| 松阳县| 昆明市| 罗平县| 苗栗市| 武城县| 阳山县| 昌吉市| 台安县| 鞍山市| 黄骅市| 密云县| 天峻县| 探索| 龙游县| 登封市| 惠安县| 长葛市| 图片| 台南县| 祥云县| 大石桥市|