How to Install and Uninstall thc-pptp-bruter Package on Kali Linux
Last updated: January 11,2025
1. Install "thc-pptp-bruter" package
In this section, we are going to explain the necessary steps to install thc-pptp-bruter on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
thc-pptp-bruter
Copied
2. Uninstall "thc-pptp-bruter" package
Please follow the step by step instructions below to uninstall thc-pptp-bruter on Kali Linux:
$
sudo apt remove
thc-pptp-bruter
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the thc-pptp-bruter package on Kali Linux
Package: thc-pptp-bruter
Version: 0.1.4-1kali4
Architecture: amd64
Maintainer: Kali Developers
Installed-Size: 47
Depends: libc6 (>= 2.34), libssl3 (>= 3.0.0)
Homepage: http://www.thc.org/releases.php
Priority: optional
Section: net
Filename: pool/main/t/thc-pptp-bruter/thc-pptp-bruter_0.1.4-1kali4_amd64.deb
Size: 15492
SHA256: 2fd74891b363a899014820759f937956d47f7a1eea071d91a448edff906fdead
SHA1: acf41ee7411c76c20a7bb66c643d69314d21d5e9
MD5sum: 0be25c86c6d2de2889f44556662d9c10
Description: THC PPTP Brute Force
Brute force program against pptp vpn endpoints (tcp port 1723). Fully
standalone. Supports latest MSChapV2 authentication. Tested against Windows
and Cisco gateways. Exploits a weakness in Microsoft's anti-brute force
implementation which makes it possible to try 300 passwords the second.
Description-md5:
Version: 0.1.4-1kali4
Architecture: amd64
Maintainer: Kali Developers
Installed-Size: 47
Depends: libc6 (>= 2.34), libssl3 (>= 3.0.0)
Homepage: http://www.thc.org/releases.php
Priority: optional
Section: net
Filename: pool/main/t/thc-pptp-bruter/thc-pptp-bruter_0.1.4-1kali4_amd64.deb
Size: 15492
SHA256: 2fd74891b363a899014820759f937956d47f7a1eea071d91a448edff906fdead
SHA1: acf41ee7411c76c20a7bb66c643d69314d21d5e9
MD5sum: 0be25c86c6d2de2889f44556662d9c10
Description: THC PPTP Brute Force
Brute force program against pptp vpn endpoints (tcp port 1723). Fully
standalone. Supports latest MSChapV2 authentication. Tested against Windows
and Cisco gateways. Exploits a weakness in Microsoft's anti-brute force
implementation which makes it possible to try 300 passwords the second.
Description-md5: