- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 105字
- 2021-07-08 09:41:14
Pentesting VPN's ike-scan
Often during a pentest we may encounter VPN endpoints. However, finding vulnerabilities in those endpoints and exploiting them is not a well known method. VPN endpoints use Internet Key Exchange (IKE) protocol to set up a security association between multiple clients to establish a VPN tunnel.
IKE has two phases, phase 1 is responsible for setting up and establishing secure authenticated communication channel, and phase 2 encrypts and transports data.
Our focus of interest here would be phase 1; it uses two methods of exchanging keys:
- Main mode
- Aggressive mode
We will hunt for aggressive mode enabled VPN endpoints using PSK authentication.
推薦閱讀
- Getting Started with React
- Java加密與解密的藝術(第2版)
- Practical Windows Forensics
- Python GUI Programming Cookbook
- Visual C++應用開發
- Learning Salesforce Einstein
- 數據結構習題解析與實驗指導
- ASP.NET Core 2 Fundamentals
- Regression Analysis with Python
- C# Multithreaded and Parallel Programming
- Maven for Eclipse
- PHP+MySQL Web應用開發教程
- 虛擬現實:引領未來的人機交互革命
- Implementing Splunk(Second Edition)
- Web程序設計與架構