5900 - VNC
VNC is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. VNC usually uses ports 5800 or 5801 or 5900 or 5901.
Enumeration
nmap -sV --script vnc-info,realvnc-auth-bypass,vnc-title -p <PORT> <IP>
msf> use auxiliary/scanner/vnc/vnc_none_authConnect to VNC using Kali
vncviewer [-passwd passwd.txt] <IP>::5901Nmap:
Script: vnc-info
Example Usage
nmap -p 5901 --script vnc-info 192.168.0.50
PORT STATE SERVICE
5900/tcp open vnc
| vnc-info:
| Protocol version: 3.889
| Security types:
| Mac OS X security type (30)
|_ Mac OS X security type (35) Brute Force with Metasploit
Decrypting VNC password
Default password is stored in: ~/.vnc/passwd
If you have the VNC password and it looks encrypted (a few bytes, like if it could be and encrypted password). It is probably ciphered with 3des. You can get the clear text password using https://github.com/jeroennijhof/vncpwd
You can do this because the password used inside 3des to encrypt the plain-text VNC passwords was reversed years ago. For Windows you can also use this tool: https://www.raymond.cc/blog/download/did/232/ I save the tool here also for ease of access:
Shodan
port:5900 RFB
Last updated
Was this helpful?