|
Message-ID: <CANO7a6yrAC=OZnjhSah8meNcq+mbztmapF7shy04LbSn0pzimg@mail.gmail.com> Date: Wed, 14 Mar 2012 22:44:35 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Re: VNC Pcap's for cracking On Wed, Mar 14, 2012 at 10:02 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote: > I have integrated VNCcrack into JtR. See > https://github.com/magnumripper/magnum-jumbo. For testing, I used > TightVNC server 1.3.9 (on Ubuntu 11.04) & TightVNC client 1.3.10 (on > Windows 7) which use RFB Protocol Version 3.8. Testing and adding > support for other VNC servers and protocol versions is TODO. For now, > vncpcap2john.cpp (included in git repository) needs to be compiled > separately. vncpcap2john.cpp currently searches for string VNCAUTH_ in the packets and so it doesn't work for pcap files (made with RealVNC) posted by Rich earlier. (VNCAUTH_ seems to be TightVNC specific thing). However Wireshark successfully recognizes VNC challenge and response packets for different VNC server versions. Time to borrow some code from Wireshark :-). Anybody familiar with Wireshark's code base and willing to extend/re-write vncpcap2john.cpp? -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.