Skip to main content

Closing PPTP on 1723

To know about PPTP go to : 
Basically PPTP is used as method to connect and implement VPN (Virtual Private Networks). There have been other protocols as well for example, IPSec. PPTP has been often criticized for its well known vulnerabilities, like weak encryption etc. But I am not concerned with all these, my challenge was to explore the ways to close the PPTP(Port 1723) on a machine (Windows XP). I did a lot of googling around on the web for hours but was unable to find any satisfying solution. Most results were related to how to setup a VPN connection using PPTP on a Windows client machine. But my question was how to close port 1723 (PPTP), if already your machine is acting as VPN server?
So, I started other way round. I setup my machine as a VPN server. Steps are very simple:
1. Go to Network connections
2. Click on "Create a new connection" wizard
3. Select "Set up an advanced connection". Click Next.
4. Select "Accept Incoming connections". Click Next.
5. Select "Allow virtual private connections" Click Next.
6. Select the users for the list to grant permission. Click Next.
7. Click Next, and Finish.
You will see an Incoming Connection icon in network connections dialog.
 Simultaneously I started to scan my PC for port 1723, and I found it open:
 Now, right click on Incoming Connections icon in network connections dialog, choose properties, go to general tab and uncheck "Allow other users to make private connections on my computer......" under Virtual Private Network section.
Now again scan the port 1723:
This is the most suitable approach I have found to close the port 1723 on Win XP.
Still I don't know how to disable this service from Services.msc, so I shall continue to use above approach. If you know, any other ways to close it, it will be greatly appreciated, if you let me know.

Update: The 1723 can also be stopped by stopping "Routing and Remote Access" services under "Services.msc"


Popular posts from this blog

File Upload through Null Byte Injection

Sometimes, during file upload we come across situation wherein there would be check on the file extension at the client side as well as server side too. If the application does allow only .jpeg extension to be uploaded, the client side java script checks for the extension of the file before passing the request. We all know that how easily this can be defeated.
Some applications, checks for the extension at the server side also. That's not easy to bypass. However there are some ways with which it still can be bypassed. Most of server side scripts are written in high level languages such as Php, Java etc who still use some C/C++ libraries to read the file name and contents. That leads to the problem. In C/C++ a line ends with /00 or which is called Null Byte. So whenever the interpreter sees a null byte at the end of the a string, it stops reading thinking it has reached at the end of the string.
This can be used for the bypass. It works for many servers, specially php servers. Th…

SQL Injection in search field

Earlier I had written about performing SQL injection in search field and how to do a DoS attack and privilege escalation using 'Like' operators. Now another SQLi exploitation I came across recently. That too in the search field. This becomes important as lots of people don't pay much attention on the search forms/ fields in the application. My aim is to show that a search form can also be exploited with SQL Injection. The following queries are based on a real world exploitation. The steps and data are for just illustration purpose only. Suppose, the search form provides the details of users who have accessed the application some time and their login time details etc, we just need to provide their name in the search box provided. All the data were being going as Post request. So, to just fingerprint the database, I provide, 'nil'+'esh' in the search field and it successfully gives me the results. That means the database behind the application is concatenat…

Insecure protocols

Some basic insecure protocols and risk associated with them: