当前位置:网站首页>Web penetration test - 5. Brute force cracking vulnerability - (6) VNC password cracking
Web penetration test - 5. Brute force cracking vulnerability - (6) VNC password cracking
2022-06-24 04:19:00 【Seven days】
List of articles
Virtual network console (Virtual Network Console:VNC) Is an excellent remote control tool software , By the famous AT&T Developed by the European research laboratory .VNC It's based on UNIX and Linux Free open source software for operating system , Remote control is powerful , Efficient and practical , Its performance can be compared with Windows and MAC Any remote control software in is comparable to . stay Linux in ,VNC There are four commands :vncserver,vncviewer,vncpasswd, and vncconnect. In most cases, the user only needs two of these commands :vncserver and vncviewer. Default port :5900
One 、hydra
Hydra Is a parallel login cracker , It supports multiple attack protocols . It's very fast and flexible , And new modules are easy to add .kali Toolset integrated .
hydra Project address :
https://github.com/vanhauser-thc/thc-hydra/releases Full version
hydra Support :
Cisco AAA、Cisco auth、Cisco enable、CVS、FTP、HTTP(S)-FORM-GET、HTTP(S)-FORM-POST、HTTP(S)-GET、HTTP(S)-HEAD、HTTP- agent 、ICQ、IMAP、IRC、LDAP、MS-SQL、MySQL、NNTP、Oracle The listener 、Oracle SID、PC-Anywhere、PC-NFS、POP3、PostgreSQL、RDP、Rexec、Rlogin、Rsh、SIP、SMB(NT)、SMTP、SMTP enumeration、SNMP v1+v2+v3、SOCKS5、SSH(v1 and v2)、SSHKEY、Subversion、Teamspeak (TS2)、Telnet、VMware-Auth、VNC and XMPP`.
hydra -s 5900 –P /root/Desktop/pass.txt –t IP vnc
-P: Indicates the path to the password list-s: Indicates the destination port number-t: Run in parallel TASKS The number of connections
Two 、Medusa
Medusa It's a fast one 、 A parallel and modular login brute force cracker . The goal is to support as many services as possible that allow remote authentication .kalikali Toolset integrated .
file :
www.foofus.net/jmk/medusa/medusa.html
Source code :https://github.com/jmk-foofus/medusahttps://github.com/jmk-foofus/medusa/archive/2.2.tar.gz
The main functions are as follows :
1、Thread based parallel testing: It can target multiple hosts at the same time 、 The user or password performs a brute force test .
2、Flexible user input: Target information can be specified in a number of ways ( host / user / password ). for example , Each item can be a single item , It can also be a file that contains multiple entries . Besides , The combined file format allows users to refine their target list .
3、Modular design: Each service module acts as an independent .mod File exists . This means that the list of supported services can be extended for brute force cracking without any modification to the core application .
4、Support multiple protocols: Many services are currently supported ( for example SMB、HTTP、POP3、MS-SQL、SSHv2 etc. ).
medusa -h 192.168.0.6 –u root -P /root/Desktop/pass.txt –M vnc
-U: Indicates the path to the user name list-P: Indicates the path to the password list-M: Specify the burst parameter type
3、 ... and 、Ncrack
Ncrack Is a high-speed network authentication cracking tool . It aims to help companies protect their networks by proactively testing all their hosts and network devices for password errors .Ncrack Is to use a modular approach 、 Be similar to Nmap Command line syntax and dynamic engine design that can adjust its behavior according to network feedback . It allows fast and reliable large-scale auditing of multiple hosts .kali Toolset integrated .
Ncrack The functionality of the includes a very flexible interface , Allow users to have complete control over network operations , Allow very complex brute force attacks , Easy to use timing templates , Be similar to Nmap The runtime interaction of . Supported protocols include
SSH、RDP、FTP、Telnet、HTTP(S)、Wordpress、POP3(S)、IMAP、CVS、SMB、VNC、SIP、Redis、PostgreSQL、MQTT、MySQL、MSSQL、MongoDB、Cassandra、WinRM、OWA , and DICOM
Project address :
https://nmap.org/ncrack/
ncrack -V --user root -P /root/Desktop/pass.txt IP:5900
-U: Indicates the path to the user name list-P: Indicates the path to the password list-v: Increase the level of detail ( Use twice or more for better results )
Four 、Patator
Patator For the use of Hydra、Medusa、Ncrack、Metasploit Module and Nmap NSE The script is written to thwart password guessing attacks . I chose a different approach , So as not to create another brute force cracking tool and avoid repeating the same shortcomings .Patator It's a use. Python Write multithreading tools , It strives to be more reliable and flexible than its predecessors .
Project address :
https://github.com/lanjelot/patator
patator vnc_login host=IP password=FILE0 0=/root/Desktop/pass.txt –t 1 –x retry:fgep!='Authentication failure' --max-retries 0 –x quit:code=0
5、 ... and 、Metasploit
use auxiliary/scanner/vnc/vnc_login
msf auxiliary(scanner/vnc/vnc_login) > set rhosts IP
msf auxiliary(scanner/vnc/vnc_login) > set pass_file /root/Desktop/pass.txt
msf auxiliary(scanner/vnc/vnc_login) > run
边栏推荐
- Worthington脱氧核糖核酸酶I特异性和相关研究
- What is a 1U server? What industries can 1U servers be used in?
- There is such a shortcut to learn a programming language systematically
- Demonstration of C language structure function research
- [new light weight first purchase special] 1-core 2g5m light weight application server costs 50 yuan in the first year. It is cost-effective and helps you get on the cloud easily!
- To the world's first full frame 3D games!
- How should the server be placed?
- web渗透测试----5、暴力破解漏洞--(6)VNC密码破解
- Troubleshoot the high memory consumption of Go program
- 一次 MySQL 误操作导致的事故,「高可用」都顶不住了!
猜你喜欢

Clang代码覆盖率检测(插桩技术)

Abnova荧光原位杂交(FISH)探针解决方案

openEuler社区理事长江大勇:共推欧拉开源新模式 共建开源新体系

编译器是如何将芯片执行的第一个指令放到芯片起始地址的?

Opengauss version 3.0 source code compilation and installation guide

Brief ideas and simple cases of JVM tuning - how to tune
![[numpy] numpy's judgment on Nan value](/img/aa/dc75a86bbb9f5a235b1baf5f3495ff.png)
[numpy] numpy's judgment on Nan value

ServiceStack. Source code analysis of redis (connection and connection pool)
![Web technology sharing | [map] to realize customized track playback](/img/b2/25677ca08d1fb83290dd825a242f06.png)
Web technology sharing | [map] to realize customized track playback

Application practice | Apache Doris integrates iceberg + Flink CDC to build a real-time federated query and analysis architecture integrating lake and warehouse
随机推荐
Flutter series: offstage in flutter
Kubernetes 资源拓扑感知调度优化
openEuler Kernel 技术分享第 20 期 | 执行实体创建与切换
C language in DSP (2) -- definition of structure
Clang code coverage detection (pile insertion technology)
多任务视频推荐方案,百度工程师实战经验分享
How should the server be placed?
Garbage collection mechanism
给你讲懂 MVCC
What is pseudo static? How to configure the pseudo static server?
How to modify the channel name registered by the camera in the easygbs national standard platform?
"." in the structure of C language And "- & gt;" Differences between
JVM调优简要思想及简单案例-怎么调优
图书馆管理后台
openGauss 3.0版本源码编译安装指南
Next. JS + cloud development webify creates an excellent website
Two most practical methods for cadence OrCAD capture to batch modify network names graphic tutorial and video demonstration
To the world's first full frame 3D games!
What is a virtual host server? What are the advantages?
Black hat SEO actual combat directory wheel chain generates millions of pages in batch