<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Isakmp on rchitect</title><link>https://www.rchitect.in/tags/isakmp/</link><description>Recent content in Isakmp on rchitect</description><generator>Hugo</generator><language>en</language><lastBuildDate>Tue, 08 Mar 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://www.rchitect.in/tags/isakmp/index.xml" rel="self" type="application/rss+xml"/><item><title>IPSEC enumeration using Strongswan</title><link>https://www.rchitect.in/posts/ipsec-enumeration/</link><pubDate>Tue, 08 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/ipsec-enumeration/</guid><description>&lt;h1 id="vpnike-enumeration"&gt;
 VPN(IKE) enumeration
 &lt;a class="heading-link" href="#vpnike-enumeration"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;isakmp service( port-500 related to ipsec VPN) only opened on server.There are some inbuilt scanners in Kali linux to enumerate IPSEC VPN&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;$ ike-scan -M 10.10.10.116 
Starting ike-scan 1.9.4 with 1 hosts (http://www.nta-monitor.com/tools/ike-scan/)
10.10.10.116 Main Mode Handshake returned
 HDR=(CKY-R=8ec1706b5f6632a8)
 SA=(Enc=3DES Hash=SHA1 Group=2:modp1024 Auth=PSK LifeType=Seconds LifeDuration(4)=0x00007080)
 VID=1e2b516905991c7d7c96fcbfb587e46100000009 (Windows-8)
 VID=4a131c81070358455c5728f20e95452f (RFC 3947 NAT-T)
 VID=90cb80913ebb696e086381b5ec427b1f (draft-ietf-ipsec-nat-t-ike-02\n)
 VID=4048b7d56ebce88525e7de7f00d6c2d3 (IKE Fragmentation)
 VID=fb1de3cdf341b7ea16b7e5be0855f120 (MS-Negotiation Discovery Capable)
 VID=e3a5966a76379fe707228231e5ce8652 (IKE CGA version 1)

Ending ike-scan 1.9.4: 1 hosts scanned in 0.325 seconds (3.08 hosts/sec). 1 returned handshake; 0 returned notify
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The tunnel uses IKE-V1 as per above results.To confirm its not running on IKE-V2&lt;/p&gt;</description></item><item><title>Hackthebox Conceal</title><link>https://www.rchitect.in/posts/htb-conceal/</link><pubDate>Mon, 07 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/htb-conceal/</guid><description>&lt;h1 id="hackthebox-conceal-walkthrough"&gt;
 Hackthebox Conceal Walkthrough
 &lt;a class="heading-link" href="#hackthebox-conceal-walkthrough"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;&lt;img src="https://www.rchitect.in/images/walk/conceal/1.png" alt="conceal"&gt;&lt;/p&gt;
&lt;h3 id="initial-enumeration"&gt;
 Initial Enumeration
 &lt;a class="heading-link" href="#initial-enumeration"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h3&gt;
&lt;h4 id="port-scan"&gt;
 Port Scan
 &lt;a class="heading-link" href="#port-scan"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h4&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;$ sudo nmap -sT -p- -min-rate 10000 -Pn -oN alltcp.txt 10.10.10.116
sudo nmap -sU -p- -min-rate 10000 -Pn -oN alludp.txt 10.10.10.116
[sudo] password for rocky: 
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-27 19:46 EST
Nmap scan report for 10.10.10.116
Host is up.
All 65535 scanned ports on 10.10.10.116 are filtered

Nmap done: 1 IP address (1 host up) scanned in 130.18 seconds
Host discovery disabled (-Pn). All addresses will be marked &amp;#39;up&amp;#39; and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-02-27 19:48 EST
Nmap scan report for 10.10.10.116
Host is up (0.16s latency).
Not shown: 65534 open|filtered ports
PORT STATE SERVICE
500/udp open isakmp

Nmap done: 1 IP address (1 host up) scanned in 14.25 seconds
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;I have decided to run the &lt;a href="https://rchitect.in/posts/autorecon/" class="external-link" target="_blank" rel="noopener"&gt;Autorecon&lt;/a&gt; script as well to confirm i have not missed anything. It took longer time(more than 40min). I could see and additinal udp port 161 as well.Full results are uploaded [here](&lt;a href="https://github.com/tcprks/Rchitect/blob/Yoda/CTF/conceal/_top_100_udp_nmap.txt" class="external-link" target="_blank" rel="noopener"&gt;Rchitect/_top_100_udp_nmap.txt at Yoda · tcprks/Rchitect · GitHub&lt;/a&gt;). There 2 services to enumerate( SNMP and ISAKMP)&lt;/p&gt;</description></item></channel></rss>