Hacktricks-skills pptp-pentesting
How to enumerate and pentest PPTP (Point-to-Point Tunneling Protocol) services on port 1723. Use this skill whenever the user mentions PPTP, port 1723, GRE protocol, remote access tunneling, or needs to assess PPTP security during authorized penetration testing. This skill covers enumeration, brute force attacks, and known PPTP vulnerabilities.
git clone https://github.com/abelrguezr/hacktricks-skills
skills/network-services-pentesting/1723-pentesting-pptp/SKILL.MDPPTP Pentesting
Point-to-Point Tunneling Protocol (PPTP) is a remote access protocol that uses TCP port 1723 for control traffic and IP protocol 47 (GRE) for encrypted data transmission. This skill helps you enumerate and assess PPTP services during authorized penetration testing engagements.
⚠️ Authorization Required: Only use these techniques on systems you own or have explicit written permission to test.
When to Use This Skill
Use this skill when:
- You discover port 1723 open during network scanning
- You need to assess PPTP VPN security
- You're testing remote access configurations
- You encounter GRE protocol (IP 47) in firewall rules
- You need to understand PPTP vulnerabilities and attack vectors
Enumeration
Basic Service Detection
Start by confirming PPTP is running and gathering service information:
# Basic PPTP enumeration nmap -Pn -sSV -p1723 <target-ip> # More detailed scan including GRE protocol nmap -Pn -sV -sT -p1723 --script ppp-pptp <target-ip> # Full scan to see all open ports and services nmap -Pn -sC -sV -p1723 <target-ip>
Check GRE Protocol
PPTP requires GRE (IP protocol 47) to function. Verify it's allowed:
# Check if GRE is open nmap -Pn -sA -p1723 <target-ip> # Or use tcpdump to monitor GRE traffic tcpdump -i <interface> 'ip[9] == 47'
Vulnerability Assessment
Known PPTP Weaknesses
PPTP has several well-documented vulnerabilities:
- MS-CHAPv2 Weakness: The MS-CHAPv2 authentication protocol used by PPTP can be cracked offline using tools like
chapcrack - GRE Encryption Issues: GRE provides no encryption by default, only encapsulation
- Protocol Design Flaws: PPTP was designed in the 1990s and has fundamental security weaknesses
Reference Resources
- Schneier's PPTP Analysis - Detailed security analysis
- chapcrack Tool - MS-CHAPv2 cracking tool
Attack Vectors
Brute Force Authentication
If PPTP accepts connections, attempt to enumerate valid credentials:
# Using p0f or similar tools to fingerprint # Then attempt credential attacks with appropriate tools # Example with hydra (if available) hydra -l <username> -P <wordlist> pptp://<target-ip>
Capture MS-CHAPv2 Handshake
To crack PPTP credentials, you need to capture the MS-CHAPv2 handshake:
- Set up a man-in-the-middle position (requires network access)
- Capture the authentication exchange using packet capture tools
- Extract the challenge/response pairs
- Crack offline using chapcrack or similar tools
# Capture PPTP traffic tcpdump -i <interface> -s 0 -w pptp_capture.pcap host <target-ip> and port 1723 # Extract MS-CHAPv2 data (requires specialized tools) # Then crack with: chapcrack -c <challenge> -r <response> -w <wordlist>
Testing Checklist
When assessing PPTP security, verify:
- Port 1723 is accessible
- GRE protocol (IP 47) is allowed through firewalls
- Service version and banner information
- Authentication mechanism (MS-CHAPv1/v2)
- Whether encryption is actually enabled
- Default or weak credentials
- Certificate validation (if using EAP)
Reporting
When documenting PPTP findings:
- Risk Level: PPTP is generally considered high risk due to inherent protocol weaknesses
- Recommendation: Migrate to more secure protocols (OpenVPN, WireGuard, IKEv2)
- Evidence: Include nmap output, captured handshakes (if applicable), and successful authentication attempts
- Remediation: Disable PPTP, implement modern VPN solutions
Tools Reference
| Tool | Purpose |
|---|---|
| nmap | Service enumeration and version detection |
| tcpdump | Traffic capture for handshake extraction |
| chapcrack | MS-CHAPv2 credential cracking |
| hydra | Brute force authentication attacks |
| p0f | Protocol fingerprinting |
Important Notes
- PPTP is deprecated and should not be used for sensitive data
- Even with strong passwords, MS-CHAPv2 can be vulnerable to offline attacks
- GRE traffic may be blocked by modern firewalls and NAT devices
- Many modern systems no longer support PPTP by default
Next Steps
After initial enumeration:
- Document all findings
- Attempt authorized authentication testing
- Capture handshakes if MITM position is available
- Assess the impact of any successful attacks
- Recommend migration to secure alternatives