Results 1 to 4 of 4

Thread: Cracking VNC Passwords

  1. #1
    Senior Member
    Join Date
    Nov 2001
    Posts
    4,785

    Cracking VNC Passwords

    RealVNC is a much used and pretty secure program as far as remote attacks go as long as a strong password is set. But it's only as secure as the computer its on

    Its password is stored locally and is very easily cracked.

    To illustrate this I used a program called x4 which is made spcefically for decoding vnc paswords.

    after i set the password to "my_pass" (so i can put back my real password when im finished) i retrieve it from the registry where it is stored in hexadecimal format

    HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3\Default

    password b8 1e ac 6a ed f4 36 30

    After starting the program using the -W flag for 'windows interactive' each pair of charecters gets entered one at a time until all eight are entered

    C:\Pwd>x4 -W
    b8
    1e
    ac
    6a
    ed
    f4
    36
    30
    Entered HEX String: b8 1e ac 6a ed f4 36 30
    VNC Password: my_pass

    C:\Pwd>

    The decrypted password immeditally appears.

    Do not use vnc on a computer where others that you shouldn't trust have access to it and change the password often. Also keep in mind that the registry is accessable to anyone who gains a remote shell on your computer so keep it patched and firewalled. In earlier version vnc was vulnerable to session hi-jacking and although thats been fixed a weak password can still be brute forced.
    Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”

  2. #2
    Computer Forensics
    Join Date
    Jul 2001
    Posts
    672
    That's just another reason to tunnel it through ssh

    It doesn't change the fact that it uses weak password algorithms though. Try it on tightvnc if you have the chance.
    Antionline in a nutshell
    \"You\'re putting the fate of the world in the hands of a bunch of idiots I wouldn\'t trust with a potato gun\"

    Trust your Technolust

  3. #3
    Junior Member
    Join Date
    Jan 2021
    Posts
    1
    Hello

    can you help me if i send a code can you decrypt what the password is?

    have code from ini file but can not work out what the password is?


    Quote Originally Posted by Tedob1 View Post
    RealVNC is a much used and pretty secure program as far as remote attacks go as long as a strong password is set. But it's only as secure as the computer its on

    Its password is stored locally and is very easily cracked.

    To illustrate this I used a program called x4 which is made spcefically for decoding vnc paswords.

    after i set the password to "my_pass" (so i can put back my real password when im finished) i retrieve it from the registry where it is stored in hexadecimal format

    HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3\Default

    password b8 1e ac 6a ed f4 36 30

    After starting the program using the -W flag for 'windows interactive' each pair of charecters gets entered one at a time until all eight are entered

    C:\Pwd>x4 -W
    b8
    1e
    ac
    6a
    ed
    f4
    36
    30
    Entered HEX String: b8 1e ac 6a ed f4 36 30
    VNC Password: my_pass

    C:\Pwd>

    The decrypted password immeditally appears.

    Do not use vnc on a computer where others that you shouldn't trust have access to it and change the password often. Also keep in mind that the registry is accessable to anyone who gains a remote shell on your computer so keep it patched and firewalled. In earlier version vnc was vulnerable to session hi-jacking and although thats been fixed a weak password can still be brute forced.

  4. #4
    Administrator Steve R Jones's Avatar
    Join Date
    Apr 2011
    Location
    USA
    Posts
    390
    This thread is 17 YEARS Old.

    Hacking/Cracking passwords or anything else is NOT Allowed.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •