官术网_书友最值得收藏!

Pentesting VPN's ike-scan

Often during a pentest we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well known method. VPN endpoints use Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.

IKE has two phases, phase 1 is responsible for setting up and establishing secure authenticated communication channel, and phase 2 encrypts and transports data.

Our focus of interest here would be phase 1; it uses two methods of exchanging keys:

  • Main mode
  • Aggressive mode

We will hunt for aggressive mode enabled VPN endpoints using PSK authentication.

主站蜘蛛池模板: 偏关县| 布尔津县| 谷城县| 阿拉善右旗| 鄂托克前旗| 江津市| 洛宁县| 蕉岭县| 高雄市| 浑源县| 巩留县| 水城县| 松溪县| 盖州市| 黄骅市| 昌黎县| 锡林郭勒盟| 巴林右旗| 志丹县| 泸溪县| 交口县| 泽普县| 巨鹿县| 浙江省| 灌阳县| 阿鲁科尔沁旗| 河津市| 江源县| 康平县| 久治县| 西和县| 安国市| 自治县| 板桥市| 信宜市| 海阳市| 秦皇岛市| 衡水市| 仁化县| 古田县| 石河子市|