VNC Config
Theory
VNC clients uses a hardcoded DES key to store credentials. If you have access to a VNC config file you may be able to decrypt it as the same key is used across multiple product lines.
Practice
On Windows systems, you may find the VNC password in the following files.
VNC Client | Config File | Password |
---|---|---|
RealVNC | HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\vncserver | Value: Password |
TightVNC | HKEY_CURRENT_USER\Software\TightVNC\Server | HKLM\SOFTWARE\TightVNC\Server\ControlPassword |
tightvnc.ini | vnc_viewer.ini | Value: Password or PasswordViewOnly |
TigerVNC | HKEY_LOCAL_USER\Software\TigerVNC\WinVNC4 | Value: Password |
UltraVNC | C:\Program Files\UltraVNC\ultravnc.ini | Value: passwd or passwd2 |
Once you have extracted the hexadecimal-encoded password, we can decrypt it using only native Linux tools
Msfconsole can also be used to decrypt the password as follows (example with key 17526b06234e5807)
Resources
Last updated