O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing by Robert W. Beggs

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacking an IPSec Virtual Private Network

A virtual private network (VPN), uses the Internet to provide secure (encrypted) communications between remote locations or users within the same network. There are two types of VPNs: IPSec and SSL.

IPSec is the most commonly used protocol to establish secure connections between networks and connect hosts in virtual private networks.

Within IPSec, there are several subsidiary protocols that perform specific functions, such as the following:

  • Authentication Header (AH): This provides proof of origin for IP packets, protecting them against replay attacks.
  • Encapsulation Security Protocol (ESP): This protocol provides the origin authenticity, integrity, and confidentiality of the transmitted data.
  • Security Association ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required