Jump to content

Search the Community

Showing results for tags 'pptp'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Enter a five letter word.

Found 2 results

  1. Hey guys - I know there's no metrics or anything, so I pose the question to you all. How commonplace is it for malicious sniffers to utilize chapcrack? Between arp poisoning, IDS, wifi pineapples, or just sniffing the air, there's a lot of pcaps being created out there. Of the malicious sniffers, how many are cracking mschapv2? The reason I ask is because a friend still uses pptp for his vpn's and for his wpa2-enterprise radius server. He claims that because pptp is so easy to deploy and compatibility is through the roof, and that chapcracks use is so rare, that its worth sticking with mschapv2. With Darren's recent episode on installing a pptp server (and subsequent episode apologizing and giving the how-to on openvpn) its got me thinking about the issue again. I mean, chapcracks been out for years now, and I almost never hear about it. Does the fact that you have to pay $20 to cloudcracker hinder its popularity? What do you think? telot
  2. I've been really frustrated over the past couple of years by VPN's disconnecting and leaking real IP's. It's never been a life or death issue for me, but it's plenty annoying and when I introduce people to the concept of a VPN or proxy and set them up with it I really want it to work without betraying them. I know that disconnects happen, especially when you've been connected for long periods of time. Can't change that. But is there some way to tell Windows, OS X, and/or Linux that "when this VPN [or proxy] gets disconnected I want you to disconnect from the Internet/Access Point and do not send any traffic unless I've reconnected?". Also, I'm wondering if it's possible to get some additional layers, like with a simple proxy chain. I've never heard of anyone getting a chain of VPN's to work, although I used to do VPS + VPN pretty easily. How about proxies + VPN? If I tell application X, like a torrent client or email program or whatever, to use this HTTP or SOCKS5 proxy while my OpenVPN is running then will the traffic going to application X pass through both the OpenVPN and proxy or will the proxy essentially operate independently of the VPN? What I mean is, normally the VPN knows your "real" IP as well as the server IP is assigns to you. The same is true of a SOCKS 5 or HTTP proxy. But can we make it where traffic goes from you to the VPN then from the VPN to the proxy, such that the proxy never sees your real IP and the external Internet never sees the IP of the VPN?
  • Create New...