Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0x90/vpn-arsenal
VPN pentest tools and scripts
https://github.com/0x90/vpn-arsenal
Last synced: about 1 month ago
JSON representation
VPN pentest tools and scripts
- Host: GitHub
- URL: https://github.com/0x90/vpn-arsenal
- Owner: 0x90
- Created: 2017-06-17T20:33:40.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2017-06-18T09:48:26.000Z (over 7 years ago)
- Last Synced: 2024-11-03T21:33:56.943Z (about 1 month ago)
- Language: Perl
- Size: 373 KB
- Stars: 121
- Watchers: 6
- Forks: 42
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - 0x90/vpn-arsenal - VPN pentest tools and scripts (Perl)
- awesome-network-stuff - **64**星
README
# VPN arsenal
VPN pentest tools and scripts## Links
https://www.trustwave.com/Resources/SpiderLabs-Blog/Cracking-IKE-Mission-Improbable-(Part-1)/
https://www.trustwave.com/Resources/SpiderLabs-Blog/Cracking-IKE-Mission-Improbable-(Part-2)/
https://www.trustwave.com/Resources/SpiderLabs-Blog/Cracking-IKE-Mission-Improbable-(Part3)/
http://resources.infosecinstitute.com/vulnvpn/
https://insinuator.net/2013/08/vulnerabilities-attack-vectors-of-vpns-pt-1/
https://nohats.ca/wordpress/blog/2015/05/20/weakdh-and-ike-ipsec/
Fake VPN Server
http://www.roe.ch/FakeIKEd
## Papers
http://www.sersc.org/journals/IJAST/vol8/2.pdf and
http://www.radarhack.com/dir/papers/Scanning_ike_with_ikescan.pdf
https://www.giac.org/paper/gcih/541/vpn-aggressive-mode-pre-shared-key-brute-force-attack/104625
https://www.ernw.de/download/pskattack.pdf
https://www.infosec.gov.hk/english/technical/files/vpn.pdf
https://www.nccgroup.trust/globalassets/newsroom/uk/blog/documents/2017/06-june/cisco-asa-episode-1-ikev1-exploit-web.pdf
## CVE / Exploits
http://www.securiteam.com/securitynews/5EP0K00G1G.html
https://www.nccgroup.trust/uk/our-research/cisco-ipsec-vpn-implementation-group-name-enumeration/
https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/june/a-warcon-2017-presentation-cisco-asa-exploiting-the-ikev1-heap-overflow-cve-2016-1287/
https://blog.exodusintel.com/2016/02/10/firewall-hacking/
https://github.com/raghvenrda/pintu/blob/773a2237f9b3620a11d5a4db7702d272cc58273a/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb
https://zerosum0x0.blogspot.ru/2016/09/reverse-engineering-cisco-asa-for.html
https://github.com/nixawk/pentest-wiki/blob/master/4.Post-Exploitation/How-to-hack-Cisco-ASA-with-CVE-2016-6366.md
https://www.rapid7.com/db/modules/auxiliary/admin/cisco/cisco_asa_extrabacon
https://github.com/RiskSense-Ops/CVE-2016-6366
https://www.exploit-db.com/exploits/39823/
https://github.com/adamcaudill/EquationGroupLeak/tree/master/Firewall/TOOLS/BenignCertain/benigncertain-v1110
http://blog.csdn.net/nixawk/article/details/52705184
## Tools
http://ikecrack.sourceforge.net/
https://github.com/KMGbully/ikebrute
https://github.com/SpiderLabs/ikeforce
http://svn.unix-ag.uni-kl.de/vpnc/
## Bruteforce
https://hashcrack.org/crackq/page?n=ike