TCP
Опасный
Удалённый доступ
Порт 1723 (PPTP)
Узнайте о порте 1723 (PPTP) - угрозы безопасности, уязвимости и применение. Найдите устройства с открытым портом 1723.
Краткая информация
Номер порта
1723
Протокол
TCP
Сервис
PPTP
Имя IANA
PPTP
Описание сервиса
TCP port 1723 is the standard port for Point-to-Point Tunneling Protocol (PPTP), a method for implementing virtual private networks (VPNs). PPTP, developed by Microsoft in the late 1990s, creates a tunnel over a TCP/IP network to encapsulate PPP (Point-to-Point Protocol) frames, allowing remote clients to securely connect to a private network. The protocol uses TCP port 1723 for connection management and control, while GRE (Generic Routing Encapsulation, protocol 47) handles the actual data transfer. The client initiates a TCP connection to the server on port 1723. Once the connection is established, PPTP uses this channel to negotiate encryption and authentication parameters. After the negotiation, GRE is used to encapsulate the PPP frames, providing a secure channel for data transmission. PPTP authenticates users using various methods, including Password Authentication Protocol (PAP), Challenge-Handshake Authentication Protocol (CHAP), and Microsoft CHAP (MS-CHAP).
## Firewall Recommendations
Due to the inherent security weaknesses of PPTP, it is generally recommended to block TCP port 1723 and GRE protocol 47 unless absolutely necessary. If PPTP must be used, it should be replaced with a more secure VPN protocol such as OpenVPN, IPsec, or WireGuard. If blocking is not possible, ensure that strong passwords are used, and consider implementing multi-factor authentication. Monitor network traffic for suspicious activity, and keep the PPTP server software up to date with the latest security patches. It is crucial to understand that even with these measures, PPTP remains a high-risk protocol and should be avoided whenever possible. Consider using a modern VPN solution that offers better security features and encryption algorithms.
## Firewall Recommendations
Due to the inherent security weaknesses of PPTP, it is generally recommended to block TCP port 1723 and GRE protocol 47 unless absolutely necessary. If PPTP must be used, it should be replaced with a more secure VPN protocol such as OpenVPN, IPsec, or WireGuard. If blocking is not possible, ensure that strong passwords are used, and consider implementing multi-factor authentication. Monitor network traffic for suspicious activity, and keep the PPTP server software up to date with the latest security patches. It is crucial to understand that even with these measures, PPTP remains a high-risk protocol and should be avoided whenever possible. Consider using a modern VPN solution that offers better security features and encryption algorithms.
Информация о безопасности
PPTP is widely considered insecure due to several inherent vulnerabilities. The authentication protocols used by PPTP, such as PAP and CHAP, are weak and susceptible to brute-force attacks and eavesdropping. MS-CHAP v1 is notoriously vulnerable to offline cracking, allowing attackers to recover user credentials. MS-CHAP v2 is also vulnerable to man-in-the-middle attacks. Furthermore, the encryption used by PPTP, typically MPPE (Microsoft Point-to-Point Encryption), has known weaknesses and can be broken using readily available tools. The combination of weak authentication and encryption makes PPTP a prime target for attackers seeking to intercept or decrypt sensitive data. Due to these vulnerabilities, PPTP should be avoided in environments where security is a concern. Attackers often target PPTP servers because they are easy to exploit and provide a relatively simple entry point into a network.
Известные уязвимости
| CVE | Название | Критичность | Описание |
|---|---|---|---|
| CVE-1998-0025 | MS-CHAP v1 Vulnerability | Critical | MS-CHAP v1 is vulnerable to offline dictionary attacks, allowing attackers to recover user passwords. |
| CVE-2012-2556 | PPTP Protocol Vulnerability | Medium | PPTP is vulnerable to man-in-the-middle attacks when using MS-CHAP v2. |
| CVE-2012-3948 | MPPE Weak Encryption | High | The MPPE encryption algorithm used by PPTP has known weaknesses and can be broken with sufficient computational resources. |
| CVE-2014-0411 | Windows PPTP Vulnerability | High | A privilege escalation vulnerability exists in Windows when the PPTP driver improperly handles objects in memory. |
Распространённое ПО
- Windows VPN Client
- Linux PPTP Client (pptpd)
- D-Link Routers
- Cisco Routers
- MikroTik Routers
- FreeRADIUS (for authentication)
Найти устройства с этим портом
Обнаружьте все устройства с открытым портом 1723 в любой стране.
Искать порт 1723Найдите все устройства с открытым портом 1723
ScaniteX сканирует миллионы IP-адресов для поиска устройств с определёнными открытыми портами. Идеально для исследований безопасности и аудита сети.
Начать массовое сканирование
RU
English