hacktricks/src/network-services-pentesting/1723-pentesting-pptp.md
Carlos Polop ad3f52d725 t2
2025-01-03 01:07:38 +01:00

28 lines
955 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# 1723 - Pentesting PPTP
{{#include ../banners/hacktricks-training.md}}
## Basic Information
**Point-to-Point Tunneling Protocol (PPTP)** is a method widely employed for **remote access** to mobile devices. It utilizes **TCP port 1723** for the exchange of keys, while **IP protocol 47** (Generic Routing Encapsulation, or **GRE**), is used to encrypt the data that is transmitted between peers. This setup is crucial for establishing a secure communication channel over the internet, ensuring that the data exchanged remains confidential and protected from unauthorized access.
**Default Port**:1723
## Enumeration
```bash
nmap Pn -sSV -p1723 <IP>
```
### [Brute Force](../generic-hacking/brute-force.md#pptp)
## Vulnerabilities
- [https://www.schneier.com/academic/pptp/](https://www.schneier.com/academic/pptp/)
- [https://github.com/moxie0/chapcrack](https://github.com/moxie0/chapcrack)
{{#include ../banners/hacktricks-training.md}}