Chris Gates wrote a blog post about the ‘getvncpw’ meterpreter script. I ran into the same issue on Penetration Tests in the past but didn’t know much about the wacked out version of DES that RFB (the VNC protocol) was using. Not being a fan of manually editing a binary and compiling each time I had a password to crack I wanted to find another way, but didn’t get a chance to.
Yesterday I saw this ticket: https://www.metasploit.com/redmine/issues/3183 and thought to myself: “Thats definitely within my coding ability to contribute a patch for”. After almost 15 hours of coding between 9 pm on Saturday and 8 pm on Sunday. It went far and beyond just adding in a bit of code to support UltraVNC.
changelog:
Complete rewrite as a post module instead of a meterpreter script
Passwords of less than 8 characters are correctly padded (thanks jduck)
UltraVNC checks added
TightVNC checks added for both VNC and it’s control console
Made it very simple to add new checks in either the registry or in a file
Output is a bit more verbose (lets you know something is happening
Reports authentication credentials found to database
Identifies the port that VNC is running on as well
It isn’t in the metasploit trunk so until/if if gets added you can get it here: