thc-pptp-bruter Package Description

Brute force program against pptp vpn endpoints (tcp port 1723). Fully standalone. Supports latest MSChapV2 authentication. Tested against Windows and Cisco gateways. Exploits a weakness in Microsoft’s anti-brute force implementation which makes it possible to try 300 passwords the second.

Source: https://www.thc.org/releases.php
thc-pptp-bruter Homepage | Kali thc-pptp-bruter Repo

  • Author: van Hauser
  • License: GPLv2

Tools included in the thc-pptp-bruter package

thc-pptp-bruter – PPTP Brute Force Tool
[email protected]:~# thc-pptp-bruter
Target IP missing.
thc-pptp-bruter [options] <remote host IP>
  -v        Verbose output / Debug output
  -W        Disable windows hack [default: enabled]
  -u <user> User [default: administrator]
  -w <file> Wordlist file [default: stdin]
  -p <n>    PPTP port [default: 1723]
  -n <n>    Number of parallel tries [default: 5]
  -l <n>    Limit to n passwords / sec [default: 100]

Windows-Hack reuses the LCP connection with the same caller-id. This
gets around MS's anti-brute forcing protection. It's enabled by default.

thc-pptp-bruter Usage Example

[email protected]:~# coming soon