Blog | G5 Cyber Security

Understanding IPSec

This quick tutorial gives you a foundation for understanding the IPSec protocol and how it can be used to secure some online sessions. The attack targets IKE s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions. Mike Mimoso and Chris Brook discuss the news of the week: The latest Xen vulnerability, CISA passing the Senate, a researcher challenging that Weak DH paper, and more.

Source: https://threatpost.com/understanding-ipsec-040809/72529/

Exit mobile version