{
	"id": "fa501131-41c9-444e-9dc7-5acc43ec7c60",
	"created_at": "2026-04-06T00:17:08.700226Z",
	"updated_at": "2026-04-10T03:20:27.683872Z",
	"deleted_at": null,
	"sha1_hash": "72409306c643e76b229138d22a53be97b9518d3a",
	"title": "Attacking VNC Servers",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 105342,
	"plain_text": "Attacking VNC Servers\r\nPublished: 2012-10-30 · Archived: 2026-04-05 15:34:46 UTC\r\nOften in infrastructure penetration tests,you might come across with the VNC service.The main use of this service\r\nis because systems administrators want to control remotely other systems or for technical support issues.So when\r\na penetration tester discovers a VNC server running on port 5900 then it is a good practice to check if he could\r\ngain access to the system from that service by testing it for weak passwords.In this tutorial we will see how we\r\ncan attack a VNC server.\r\nSo lets say that we have discover a VNC service running on port 5900 through our nmap scan.\r\nVNC Service Discovery\r\nNow we can use the metasploit framework in order to attack this service.The module that we will need is the\r\nvnc_login.Unfortunately metasploit doesn’t provide a big word-list for this module so we might want to use an\r\nalternative word-list in order our attack to have more efficiency.We are configuring the module and we are\r\nexecuting it with the run command.\r\nVNC Authentication Scanner\r\nAs we can see from the image above the vnc scanner has managed to authenticate with the password admin.Now\r\nwe can use the VNC viewer in order to authenticate with the remote host and to start the post exploitation\r\nactivities.\r\nhttps://pentestlab.blog/2012/10/30/attacking-vnc-servers/\r\nPage 1 of 2\n\nConclusion\r\nVNC is a service that it can be discovered quite often in networks.As we saw the metasploit module is simple and\r\neffective and it can be used for testing this service.Metasploit provides of course and other modules that can\r\nexploit VNC vulnerabilities but in order to use these modules it is advisable first to be in contact with your client.\r\nPost navigation\r\nSource: https://pentestlab.blog/2012/10/30/attacking-vnc-servers/\r\nhttps://pentestlab.blog/2012/10/30/attacking-vnc-servers/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pentestlab.blog/2012/10/30/attacking-vnc-servers/"
	],
	"report_names": [
		"attacking-vnc-servers"
	],
	"threat_actors": [],
	"ts_created_at": 1775434628,
	"ts_updated_at": 1775791227,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/72409306c643e76b229138d22a53be97b9518d3a.pdf",
		"text": "https://archive.orkl.eu/72409306c643e76b229138d22a53be97b9518d3a.txt",
		"img": "https://archive.orkl.eu/72409306c643e76b229138d22a53be97b9518d3a.jpg"
	}
}