Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANWtx01uM=kAxBB-owAPWcTF3BZj1ojVrKLqqD3BuZFM-BFoug@mail.gmail.com>
Date: Wed, 14 Mar 2012 13:26:58 -0400
From: Rich Rumble <richrumble@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: VNC Pcap's for cracking

On Wed, Mar 14, 2012 at 1:14 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> On Wed, Mar 14, 2012 at 10:02 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>> I have integrated VNCcrack into JtR. See
>> https://github.com/magnumripper/magnum-jumbo. For testing, I used
>> TightVNC server 1.3.9 (on Ubuntu 11.04) & TightVNC client 1.3.10 (on
>> Windows 7) which use RFB Protocol Version 3.8. Testing and adding
>> support for other VNC servers and protocol versions is TODO. For now,
>> vncpcap2john.cpp (included in git repository) needs to be compiled
>> separately.
>
> vncpcap2john.cpp currently searches for string VNCAUTH_ in the packets
> and so it doesn't work for pcap files (made with RealVNC) posted by
> Rich earlier. (VNCAUTH_ seems to be TightVNC specific thing). However
> Wireshark successfully recognizes VNC challenge and response packets
> for different VNC server versions. Time to borrow some code from
> Wireshark :-). Anybody familiar with Wireshark's code base and willing
> to extend/re-write vncpcap2john.cpp?
This is very exciting! Wireshark even has an example pcap of VNC traffic
you may want to try:
http://wiki.wireshark.org/SampleCaptures?action=AttachFile&do=view&target=vnc-sample.pcap
I'll look into the disectors in wireshark, but I doubt I'll be able to
code anything
(if I did it be a 1st!).
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.