{
	"id": "fbc6817d-2285-41b2-865f-510b24a89fef",
	"created_at": "2026-04-06T00:16:33.048839Z",
	"updated_at": "2026-04-10T03:21:39.315795Z",
	"deleted_at": null,
	"sha1_hash": "4f485a2786ee2cd37a056e633388a1b6918de5ec",
	"title": "Day 70: Hijacking VNC (Enum, Brute, Access and Crack)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 437893,
	"plain_text": "Day 70: Hijacking VNC (Enum, Brute, Access and Crack)\r\nBy int0x33\r\nPublished: 2019-03-10 · Archived: 2026-04-05 19:58:30 UTC\r\nPress enter or click to view image in full size\r\nVNC\r\nVirtual Network Computing (VNC) is a graphical desktop sharing system that uses the Remote Frame Buffer\r\nprotocol (RFB) to remotely control another computer. It transmits the keyboard and mouse events from one\r\ncomputer to another, relaying the graphical screen updates back in the other direction. It uses port 5900: VNC and\r\n5901: VNC-1.\r\nGet int0x33’s stories in your inbox\r\nJoin Medium for free to get updates from this writer.\r\nRemember me for faster sign in\r\nHere are simple ways to find the service, brute the service, access the service and finally crack any VNC\r\npasswords you come across.\r\nhttps://int0x33.medium.com/day-70-hijacking-vnc-enum-brute-access-and-crack-d3d18a4601cc\r\nPage 1 of 2\n\nGet Banner Info\r\nnmap -p 5901 --script vnc-info $IP\r\nBrute Force with Metasploit\r\nuse auxiliary/scanner/vnc/vnc_login\r\nConnect\r\nvncviewer $IP:5901\r\nVNC through the SSH Tunnel, passing an encrypted VNC Password\r\nvncviewer -passwd secret $IP:6901\r\nDecrypting VNC Passwords\r\nhttps://github.com/jeroennijhof/vncpwd\r\nvncpwd \u003cvnc password file\u003e\r\nSource: https://int0x33.medium.com/day-70-hijacking-vnc-enum-brute-access-and-crack-d3d18a4601cc\r\nhttps://int0x33.medium.com/day-70-hijacking-vnc-enum-brute-access-and-crack-d3d18a4601cc\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://int0x33.medium.com/day-70-hijacking-vnc-enum-brute-access-and-crack-d3d18a4601cc"
	],
	"report_names": [
		"day-70-hijacking-vnc-enum-brute-access-and-crack-d3d18a4601cc"
	],
	"threat_actors": [],
	"ts_created_at": 1775434593,
	"ts_updated_at": 1775791299,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4f485a2786ee2cd37a056e633388a1b6918de5ec.pdf",
		"text": "https://archive.orkl.eu/4f485a2786ee2cd37a056e633388a1b6918de5ec.txt",
		"img": "https://archive.orkl.eu/4f485a2786ee2cd37a056e633388a1b6918de5ec.jpg"
	}
}