ike-scan
Discover VPN servers using IKE protocol
SYNOPSIS
ike-scan [options] [hosts[/mask]]...
PARAMETERS
-M, --multiple
Send multiple possible IKE packets to each target
-E, --eap
Request EAP authentication identity
-s
Use specified source UDP port (default random)
--source=
Use specified source IP address
--srcport=
Use specified source port
--id=
Set ID payload
--vendor=
Set Vendor ID payload
-d
Set debug verbosity (1-3)
-v, --verbose
Increase verbosity
-V, --veryverbose
Very verbose output
-p
Destination UDP port (default 500)
--file=
Read targets from file
-i
Specify network interface
-S
Source port range
--iketype=
IKE packet type (1-4)
--trans=
Specify transform
-r
Retries per packet (default 3)
-t
Timeout in ms (default 5000)
-T
Preload packets (for speed)
-m
Max concurrent probes
-P, --showtransforms
Show IKE transform payloads
--fingerprint=
Fingerprint responder (1 or 2)
--printcert
Print server certificates
-N, --resolve
Resolve IP to hostname
--help
Show help
--version
Show version
DESCRIPTION
ike-scan is a command-line utility for discovering, fingerprinting, and testing IPsec VPN servers on a target network. It actively sends Phase-1 IKE (Internet Key Exchange) packets to specified hosts or IP ranges and analyzes responses to identify VPN endpoints, vendor implementations, and supported transforms.
Key features include sending multiple IKE variants for comprehensive scanning, cookie randomization to evade detection, support for aggressive mode, EAP, and certificates. It fingerprints servers by matching response payloads against a database of known vendors like Cisco, Juniper, and Palo Alto.
Common uses: network reconnaissance, security auditing, VPN compatibility testing. Output includes responder IP, cookies, vendor ID, transforms, NAT detection, and more. Pair with ptunnel or ikeprobe (included) for deeper analysis.
Requires root privileges for raw socket access. Scans UDP ports 500 (IKE) and 4500 (NAT-T). Efficient for large ranges with multithreading-like preloading.
CAVEATS
Requires root privileges for raw sockets. Scanning may be detected/blocked by firewalls/IDS. Respect legal scanning laws; aggressive scans can disrupt services. Limited to UDP; no TCP fallback. Vendor fingerprint DB may need updates.
INSTALLATION
Debian/Ubuntu: apt install ike-scan. Source: compile from ike-scan.org.
EXAMPLE
ike-scan -M --fingerprint 192.168.1.0/24 scans subnet for VPNs with fingerprinting.
HISTORY
Developed by Roy Hills starting 2001. Initial release as open-source tool for IPsec discovery. Version 1.9.4 (2012) added NAT-T, EAP support. Maintained sporadically; v1.9.5 (2023) with bugfixes. Widely used in pentesting tools like Metasploit.


