
上QQ阅读APP看书,第一时间看更新
How to do it...
- Browse to the directory where ike-scan is installed.
- Install autoconf by running the following command:
apt-get install autoconf
- Run autoreconf --install to generate a .configure file.
- Run ./configure.
- Run make to build the project.
- Run make check to verify the building stage.
- Run make install to install ike-scan.
- To scan a host for an Aggressive mode handshake, use the following command:
ike-scan x.x.x.x –M -A
The following screenshot shows the output of the preceding command:

- Sometimes, we will see the response after providing a valid group name such as vpn:
ike-scan x.x.x.x –M –A id=vpn
- To view the list of all available options, we can run the following command:
ike-scan -h
The following screenshot shows the output of the preceding command:

We can even brute force the group names using the following link: https://github.com/SpiderLabs/groupenum.
Here is the command:
./dt_group_enum.sh x.x.x.x groupnames.dic