[+]Debugging Enabled [+]Program started in XAUTH Brute Force Mode [+]Single user provided - brute forcing passwords for user: aaa Press return for a status update IKE Server running in Thread-1 --------------------Sending first Aggressive Mode packet-------------------- Calculating length Payload Length: 0024 Processing Transform payload: Next Payload: NONE Calculating length Payload Length: 002c Processing Proposal: Next Payload: NONE Payload Length: 44 SPI Size: 00 Proposal Transforms: 1 Calculating length Payload Length: 0038 Processing SA payload: Next Payload: Key Exchange (KE) Domain of Interpretation: 00000001 Situation: 00000001 Initiator DH Private Key: 65936055917372465803203837209009691483658343491951277984699194561022744453674592766431129066019846113295304566069127657339132427224322249352541772723098837126604121402572282461607983048451152944151733068846654835499503916003883391071831089367697823776877758251218121950481466694078291979379053814097709476974 Initiator DH Private Key (hex): 5de56436a9c15bfa599a5ea734502c9cb54afbda298e49e027a0a73241cdda36477bc853904f19c33e13f3621288bfcea99413282856be84ce76dc61aba6e5fa8613b1304db3a83b09d0473929c61e4d3329f3259ca8b6acc97ced2ec2b2350259fc8496309b06643c6a45aecf6f64d1cf6330a7cbeffbfd94c8cd4863cdac6e Initiator DH Public Key: 15264137847560107317588855456229674523668461160063177831570549795879580723026222321435773660810899859760269299161581736020513304038802012342971858712435917467212191194831812469047820637204934642271663997082439754695788681785538798349280494248801563924462302282838304162420257029201330229197827556283082902753 Initiator DH Public Key (hex): 15bca273bc788e669f1404869c7b30493224519e34dcd5ed0a6f0e8f438d51d8011de8f9344a3c300ab334e52c78aa91653188990aa67d4562838aa17702ed2e395f639b78f52cde26cc0c545cc2b0a32199bd55c499e323e70da1e86307ba2b0b6580ecf913d3e85c4513fbeab4d3a101ce8a8e25e5fd9768878244f3e08ce1 Calculating length Payload Length: 0084 Processing KE payload: Next Payload: Nonce (NONCE) KE Payload: 15bca273bc788e669f1404869c7b30493224519e34dcd5ed0a6f0e8f438d51d8011de8f9344a3c300ab334e52c78aa91653188990aa67d4562838aa17702ed2e395f639b78f52cde26cc0c545cc2b0a32199bd55c499e323e70da1e86307ba2b0b6580ecf913d3e85c4513fbeab4d3a101ce8a8e25e5fd9768878244f3e08ce1 Calculating length Payload Length: 0018 Processing Nonce payload: Next Payload: Identification (ID) Nonce Payload: 867ef5bca6fee5ebb26513bb549384bb8a2c63ad Calculating length Payload Length: 000c Processing Identification Payload: Next Payload: Vendor ID (VID) ID Type: 02 Group ID: 33303030 Calculating length Payload Length: 000c Processing VID Payload: Next Payload: NONE VID Data: 09002689dfd6b712 Calculating length Payload Length: 0014 Processing VID Payload: Next Payload: Vendor ID (VID) VID Data: afcad71368a1f1c96b8696fc77570100 Calculating length Payload Length: 0000011c Processing IKE Header: iCookie: dc8cf22dca2be104 rCookie: 0000000000000000 Next Payload: Security Association (SA) Version: 10 Exchange Type: 04 (Aggressive) Flags: 00 Message ID: 00000000 UDP target IP: 192.168.1.9 UDP target port: 500 UDP source port: 500 Sending: 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 --------------------Received Packet Number: 1-------------------- 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 Response received, processing packet... Parsing IKE Header: Initiator Cookie: dc8cf22dca2be104 Responder Cookie: 257c5a956e709af4 Next Payload: Security Association (SA) Version: 10 Exchange Type: 4 (Aggressive) Flags: 00 (Plain) Message ID: 00000000 Payload Length: 292 Parsing IKE Header: Initiator Cookie: dc8cf22dca2be104 Responder Cookie: 257c5a956e709af4 Next Payload: Security Association (SA) Version: 10 Exchange Type: 4 (Aggressive) Flags: 00 (Plain) Message ID: 00000000 Payload Length: 292 Parsing SA payload: Next Payload: Key Exchange (KE) Payload length: 56 Domain of Interpretation: 00000001 Situation: 00000001 Full SA Payload: 0400003800000001000000010000002c01010001000000240101000080010005800200028003fde980040002800b0001000c000400007080 Parsing Proposal Payload: Next Payload: NONE Payload Length: 44 Proposal Number: 1 Protocol ID: 1 SPI Size: 0 Proposal Transforms: 1 SPI: 0 Parsing Transform Payloads: Next Payload: NONE Payload Length: 44 Transform Number: 01 Transform ID: 01 Value type has fixed size Value type has fixed size Value type has fixed size Value type has fixed size Value type has fixed size Value type not fixed Transform length: 4 End of transform set Encryption Algorithm : 3DES-CBC Hash Algorithm : SHA Authentication Method : XAUTHInitPreShared Group Description : alternate 1024-bit MODP group Life Type : seconds Life Duration : 00007080 Parsing Key Exchange Payload: Next Payload: Nonce (NONCE) Payload Length: 132 KE data: 886a90568e376a1c6fdb4451a4c6ba16285029584bc5af957a122151fc19fe8ce77f26732be8b338d199cfac7041d86a13edd8594423a5970cfdc33766a07d5df0f23629cd9dc9e3a4fee05f320668dab628945b00a9543e9a38b9dd922992a46e8f9ec0e06b646ed06e86a07a2a55e0b023324b9846e7dc826c0bebbfbe11cc Parsing Nonce Payload: Next Payload: 5 Payload Length: 20 Nonce: d9466b42939a7592a82caf3e3c8f0299 Parsing ID Payload: Next Payload: Hash (HASH) Payload Length: 12 ID Type: ID_IPV6_ADDR (2) ID Data: 73657276 Parsing Hash Payload: Next Payload: Vendor ID (VID) Payload Length: 24 Hash Data: 8670c753ef71516e5fc46d61ab113020d9ce1aca Parsing VID Payload; Next Payload: NONE Payload Length: 20 VID Data: afcad71368a1f1c96b8696fc77570100 VID received: Dead Peer Detection v1.0 (afcad71368a1f1c96b8696fc77570100) --------------------Sending second Aggressive Mode packet-------------------- Secret: 33314055415326723824682599098795254036308989596028909206347478549841171912799174843794405127382032992855687894647475906585286055000435433017697266343549879641075941553455328804537208366002048398644305514025467592992658749197679250458378240331268879569975942848619935575612839597792125612791823652345467346137 Hexlified Secret: 2f70d79723f5c7b70de5013e109a992038045441a0bfc645e20d934dfc70c8f8d73cfe5334d89ef44f7f685485c718096b54495cb5422af84b138ad72cd7652e1997ff9356a99d0ba0fd03e6e01a61b080725afb0691812179534d3e401b23a45e1a9575f815b21c1cddaf9225e136a36cdbe62c23865058a5fb4ad6c77b9cd9 Encryption Key: ba65a7b929d9eda47b32216361daf61f4b93f1b117f79494 Calculating length Payload Length: 0018 Processing Hash Payload: Next Payload: Vendor ID (VID) Calculating length Payload Length: 000c Processing VID Payload: Next Payload: NONE VID Data: 09002689dfd6b712 Plain-text Payload: 0d0000189c45074aa17395e673952a2923b435fcef47ce3d0000000c09002689dfd6b71200000000 Encrypted Payload: dff75bc814debd22361cdf0ed655d2b82e946a685684e61322ab9f263f87099a32b45dfc9bc5f5ff Calculating length Payload Length: 00000044 Processing IKE Header: iCookie: dc8cf22dca2be104 rCookie: 257c5a956e709af4 Next Payload: Hash (HASH) Version: 10 Exchange Type: 04 (Aggressive) Flags: 01 Message ID: 00000000 UDP target IP: 192.168.1.9 UDP target port: 500 UDP source port: 500 Sending: dc8cf22dca2be104257c5a956e709af4081004010000000000000044dff75bc814debd22361cdf0ed655d2b82e946a685684e61322ab9f263f87099a32b45dfc9bc5f5ffdff75bc814debd22361cdf0ed655d2b82e946a685684e61322ab9f263f87099a32b45dfc9bc5f5ff --------------------Received Packet Number: 2-------------------- Duplicate of packet 1, discarding Duplicate packet count: 1 Shutting down server