I'm testing (starting) my ethical hack skills and testing our GlobalProtect Gateways for vulnerabilities.
I used the Windows ike-probe and Kali Linux ike-scan against a Cisco gateway with VPN services running. The ike-scan results are what I expected in receiving a response or acknowledgment of 1 returned handshake with the available ciphers. The ike-probe results were expected as well, with recv_notify on most ciphers.
I ran the same scans against a Palo Alto GlobalProtect Gateway with Portal and Gateway configured. This Gateway is working with GlobalProtect clients in IPSec mode and default settings. The ike-scan and ike-probe results are negative as compared to the Cisco gateway.
Is the Palo Alto Gateway more secure? Am I missing a command option with both scans?
Appreciate any help.
Globalprotect is an SSL based portal structure that uses SSL to negotiate connectivity. only after a user is connected will the agent switch to ipsec, so there is no regular IKE to this setup
if you want to scan ike/ipsec, create an ike gateway and vpn tunnel object on the interface
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!