---
title: "1723 - Pptp"
weight: 1723
date: "2026-03-10T10:03:28+08:00"
lastmod: "2026-03-10T13:26:55+08:00"
---

💡 **学习提示**: 本文档介绍 **1723 - PPTP** 的渗透测试方法，适合信息安全初学者和从业人员参考。

⚠️ **法律声明**: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。

---

> ⚠️ **法律声明**: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。

## 1723 - 渗透测试 PPTP

### 基本信息

**Point-to-Point Tunneling 协议 (PPTP)** is a method widely employed for **remote access** to mobile devices. It utilizes **TCP port 1723** for the exchange of keys, while **IP protocol 47** (Generic Routing Encapsulation, or **GRE**), is used to encrypt the data that is transmitted between peers. This setup is crucial for establishing a secure communication channel over the internet, ensuring that the data exchanged remains confidential and protected from unauthorized access.

**默认 端口**:1723

### 信息收集

```bash
nmap –Pn -sSV -p1723 <IP>
```

#### [暴力破解](../generic-hacking/brute-force.md#pptp)

### Vulnerabilities

- [https://www.schneier.com/academic/pptp/](https://www.schneier.com/academic/pptp/)
- [https://github.com/moxie0/chapcrack](https://github.com/moxie0/chapcrack)

---

---

---


### 搜索引擎语法

#### FOFA

```bash
# FOFA 搜索语法
port="1723"
```

#### Shodan

```bash
# Shodan 搜索语法
port:1723
```

#### ZoomEye

```bash
# ZoomEye 搜索语法
port:1723
```

---

## 📖 参考资料

- [HackTricks - 1723-pptp](https://book.hacktricks.wiki/en/network-services-pentesting/1723-pptp.html)

