{"id":1993,"date":"2009-08-21T09:44:17","date_gmt":"2009-08-21T09:44:17","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1993"},"modified":"2015-09-09T19:37:56","modified_gmt":"2015-09-09T11:37:56","slug":"ikecrack-ikeipsec-authentication-cracking-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/08\/ikecrack-ikeipsec-authentication-cracking-tool\/","title":{"rendered":"IKECrack – IKE\/IPSec Authentication Cracking Tool"},"content":{"rendered":"

[ad]<\/p>\n

IKECrack is an open source IKE\/IPSec authentication crack tool. This tool is designed to bruteforce or dictionary attack the key\/password used with Pre-Shared-Key [PSK] IKE authentication. The open source version of this tool is to demonstrate proof-of-concept, and will work with RFC 2409 based aggressive mode PSK authentication.<\/p>\n

IKE Agressive Mode BruteForce Summary<\/strong><\/p>\n

Aggressive Mode IKE authentication is composed of the following steps:<\/p>\n

    \n
  1. Initiating client sends encryption options proposal, DH public key, random number [nonce_i], and an ID in an un-encrypted packet to the gateway\/responder.<\/li>\n
  2. \nResponder creates a DH public value, another random number [nonce_r], and calculates a HASH that is sent back to the initiator in an un-encrypted packet. This hash is used to authenticate the parties to each other, and is based on the exchange nonces, DH public values, the initiator ID, other values from the initiator packet, and the Pre-Shared-Key [PSK].<\/li>\n
  3. The Initiating client sends a reply packet also containing a HASH, but this response is normally sent in an encrypted packet.<\/li>\n<\/ol>\n

    IKECrack utilizies the HASH sent in step 2, and attempts a realtime bruteforce of the PSK. This involves a HMAC-MD5 of the PSK with nonce values to determine the SKEYID, and a HMAC-MD5 of the SKEYID with DH pubkeys, cookies, ID, and SA proposal. In practice, SKEYID and HASH_R are calculated with the Hash cipher proposed by the initiator, so could actually be either SHA1 or MD5 in HMAC mode.<\/p>\n

    Project Details<\/strong><\/p>\n

    IKECrack utilizes components from the following OpenSource\/PublicDomain programs:<\/p>\n