2024-07-19 10:11:43 +00:00
|
|
|
|
# 5800,5801,5900,5901 - Pentesting VNC
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
{% hint style="success" %}
|
|
|
|
|
学习与实践 AWS 黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
|
|
|
学习与实践 GCP 黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks 培训 GCP 红队专家 (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
<details>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
<summary>支持 HackTricks</summary>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
* 查看 [**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* **加入** 💬 [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**Telegram 群组**](https://t.me/peass) 或 **关注** 我们的 **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
|
|
|
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks) 和 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) GitHub 仓库提交 PR 来分享黑客技巧。
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
2024-07-19 10:11:43 +00:00
|
|
|
|
{% endhint %}
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
## 基本信息
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
**虚拟网络计算 (VNC)** 是一个强大的图形桌面共享系统,利用 **远程帧缓冲 (RFB)** 协议实现对另一台计算机的远程控制和协作。通过 VNC,用户可以通过双向传输键盘和鼠标事件与远程计算机无缝互动。这允许实时访问,并促进高效的远程协助或网络协作。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
VNC 通常使用端口 **5800 或 5801 或 5900 或 5901.**
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
PORT STATE SERVICE
|
|
|
|
|
5900/tcp open vnc
|
|
|
|
|
```
|
2023-08-03 19:12:22 +00:00
|
|
|
|
## 枚举
|
|
|
|
|
```bash
|
|
|
|
|
nmap -sV --script vnc-info,realvnc-auth-bypass,vnc-title -p <PORT> <IP>
|
|
|
|
|
msf> use auxiliary/scanner/vnc/vnc_none_auth
|
|
|
|
|
```
|
|
|
|
|
### [**暴力破解**](../generic-methodologies-and-resources/brute-force.md#vnc)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
## 使用Kali连接到vnc
|
2023-08-03 19:12:22 +00:00
|
|
|
|
```bash
|
|
|
|
|
vncviewer [-passwd passwd.txt] <IP>::5901
|
|
|
|
|
```
|
2024-02-08 22:20:49 +00:00
|
|
|
|
## 解密 VNC 密码
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
默认 **密码存储在**: \~/.vnc/passwd
|
2023-08-03 19:12:22 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
如果你有 VNC 密码并且它看起来是加密的(几字节,就像可能是加密密码),它可能是用 3des 加密的。你可以使用 [https://github.com/jeroennijhof/vncpwd](https://github.com/jeroennijhof/vncpwd) 获取明文密码。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
```bash
|
|
|
|
|
make
|
|
|
|
|
vncpwd <vnc password file>
|
|
|
|
|
```
|
2024-07-19 10:11:43 +00:00
|
|
|
|
您之所以能够这样做,是因为用于在3des中加密明文VNC密码的密码多年前已被逆向。\
|
|
|
|
|
对于**Windows**,您还可以使用此工具:[https://www.raymond.cc/blog/download/did/232/](https://www.raymond.cc/blog/download/did/232/)\
|
|
|
|
|
我在这里也保存了该工具以便于访问:
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
|
|
|
|
{% file src="../.gitbook/assets/vncpwd.zip" %}
|
|
|
|
|
|
2022-05-01 13:25:53 +00:00
|
|
|
|
## Shodan
|
2020-09-23 23:00:32 +00:00
|
|
|
|
|
2020-09-24 19:58:30 +00:00
|
|
|
|
* `port:5900 RFB`
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
{% hint style="success" %}
|
|
|
|
|
学习和实践AWS黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks培训AWS红队专家(ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
|
|
|
|
学习和实践GCP黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks培训GCP红队专家(GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
<details>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
<summary>支持HackTricks</summary>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-07-19 10:11:43 +00:00
|
|
|
|
* 查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* **加入** 💬 [**Discord群组**](https://discord.gg/hRep4RUj7f)或[**电报群组**](https://t.me/peass)或**关注**我们的**Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
|
|
|
|
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github库提交PR来分享黑客技巧。
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
2024-07-19 10:11:43 +00:00
|
|
|
|
{% endhint %}
|