Pentesting IPsec/IKE
Discovery
# UDP scan for IKE
nmap -sU -p 500,4500 $ip
# Service version
nmap -sU -p 500 -sV $ipike-scan
# Install
sudo apt install ike-scanBasic Enumeration
# Check if IKE is running (Main Mode)
ike-scan -M $ipResult
Meaning
Vendor Identification
Aggressive Mode Attack (PSK Extraction)
Full PSK Hash Extraction
Note on Fake Hashes
Cracking IKE-PSK Hash
Hashcat IKE Modes
Mode
Description
Transform Enumeration
Transform Format
Encryption
Hash
Auth
Group
Connecting to VPN
StrongSwan
vpnc
Post-Connection
References
Last updated