Free OpenVPN safe logo

Are free VPNs safe enough?

Nowadays, more and more people are using VPN (virtual private network) for different purposes. For one of them that’s a good stuff to hide their internet activities, others use VPN for evading blocking particular web-sites, the least just wants to build common virtual LAN to communicate with their devices. Despite the end purposes, VPN can help to reach all of that aims.

In spite of the human nature or material status, free applications as well as VPN sources are more attractive to people. But is it safe enough to use free virtual private network in day-to-day activity or at least during particular cases? Let’s consider that.


0. Software

Before we dig deeper, we have to negotiate what applications we will use during our experiment.

According to web-site, the most popular virtual private network provider in the United States in 2019 is Open VPN, which has more than a quarter of the market share.

Free OpenVPN safe 001

So, what is Open VPN?

Open VPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. Open VPN allows peers to authenticate each other using pre-shared secret keys, certificates or username/password. It uses the OpenSSL encryption library extensively, as well as the TLS protocol, and contains many security and control features. It was written by James Yonan ( and is free software, released under the terms of the GNU General Public License version 2 (GPLv2). © Wikipedia –


Interesting. Due to its widespread and popularity, I would suggest to use Open VPN as our main application during the test.

For properly using Open VPN, we have to go to its official web-site ( and download the OpenVPN Connect client based on your preinstall operation system.

Free OpenVPN safe logo

For the test, we are using Kali Linux which has already preinstalled client. But, if you accidentally deleted the last one or using other Debian-based OS, you may freely download that by the following command:


apt-get install openvpn

Free OpenVPN safe 003
apt-get install openvpn

Now, let’s try it out:

Free OpenVPN safe 004
openvpn test_openvpn.ovpn

“Initialization Sequence Completed” message notify us the connection has been established. The final step is to check that by “ip a” command.

Free OpenVPN safe 005
ip a

Perfect, the connection is up: tun0 is working as intended. Now, let’s consider some free OpenVPN connections 🙂


1. FreeOpenVPN

We will start with one of the famous services on the internet – The web-site states you “stay anonymous on the Internet, have a secure connection…” and other attractive functionality. But is it exactly as it mentioned? Let’s check it out.

Free OpenVPN safe 006

To test it we are going to download a Netherlands UDP ovpn file and then launch it.

Free OpenVPN safe 007
wget; openvpn Netherlands_freeopenvpn_udp.ovpn

Nice. Our IP address is and subnet mask is 24.

Free OpenVPN safe 008
ip a

Hmmm, interesting… Why the mask is 24? Let’s try to enumerate the subnet.

Free OpenVPN safe 009
nmap -sn

Wow, that’s really unexpected. What if some of those hosts have open ports? We will check only 80 and 445 ports.

Free OpenVPN safe 010
nmap -p80,445 --open

Ok, we got something. Let’s check them out.

Free OpenVPN safe 011
Free OpenVPN safe 012; smbmap -H

We won’t try to brute force or use default password due to that’s illegal, black hatted and just unethical. But I assume you have already realized that when you connect to the VPN, you become one of the hosts of the huge network and anyone across the globe can/may hack your system.



The next in our list is service. I knew about that from Russian Linux forum Losst by the link

Free OpenVPN safe 013

Let’s try to repeat steps from the last paragraph. Follow by the link we may find the download ovpn link and creds to establish the connection.

Free OpenVPN safe 014

I selected “FR1 OpenVPN Certificate Bundle (optimized for fast web surfing; no p2p downloading)” setting file. To get the ovpn, we have to download the archive and unzip that.

Free OpenVPN safe 015
wget; unzip

Let’s launch the vpnbook-fr1-udp53.ovpn file by entering its login and password.

Free OpenVPN safe 016
openvpn vpnbook-fr1-udp53.ovpn

The next step is to find out our network settings provided by DHCP server.

Free OpenVPN safe 017
ip a

Now we have IP address, but…subnet mask is 32. What does that mean? Generally speaking, /32 means that the network has only a single IPv4 address and all traffic will go directly between the device with that IPv4 address and the default gateway. The device would not be able to communicate with other devices on the network. (c)

Ok, the settings are restricted and we won’t be able to reach other hosts. Or can we? The best solution to find this out is just to try to scan the 24 subnet. Let’s do that.

Free OpenVPN safe 018
nmap -sn

What the heck??? How is that possible? What about the IT theory, restricted settings and other smart stuffs? Never mind, we are hackers and don’t believe in what we see, because one of the technics to hide is to change the titles and banners.

Now, the port scanning…

Free OpenVPN safe 019
nmap -p80,445,14,18,22,34,42,50,58,70,74,78,102 –open; smbmap -H

Perfect as always: we found a public share with read only access (no need to enter username and password). Moreover, it has Samba 4.13.13 which has, by the Mitra report, high severity vulnerability, named CVE-2021-44141, CVE-2021-44142 and CVE-2022-0336.

You’ve already knows we are ethical hackers so we won’t go further.

Free OpenVPN safe 020

3. Remediation

My main aim is not to shame the particular web-site or their services (sorry, if I offended you), but to notify people and prevent criminal activities against them.

We have considered only 2 most famous free OpenVPN services. But there are many other with at least the same issue: after connection you become the part of the “big family” with a big red banner “Hack me if you can”.

But, if you are brave enough to use free OpenVPN services, here are some advices:

  1. Use it only from the virtual machine
  2. As a NIC use shared or host-only network
  3. Disable shared folders
  4. Turn off all unnecessary ports
  5. Disable ping response
  6. Update your apps and OS


Stay safe!