- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 81字
- 2025-02-20 22:27:48
How it works...
In aggressive mode the authentication hash is transmitted as a response to the packet of the VPN client that tries to establish a connection Tunnel (IPSEC). This hash is not encrypted and hence it allows us to capture the hash and perform a brute force attack against it to recover our PSK.
This is not possible in main mode as it uses an encrypted hash along with a six way handshake, whereas aggressive mode uses only three way.