Crack Or Decrypt Vnc Server Encrypted Password
Join GitHub today
Mar 17, 2018 - This utility will allow you to fetch and decrypt VNC passwords on a local computer system with VNC Server configured with a password.
GitHub is home to over 36 million developers working together to host and review code, manage projects, and build software together.
Sign upHave a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
commented Feb 22, 2018
How To Decrypt Md5 Password
commented Feb 22, 2018
Vnc Viewer
That would be nice, but the protocol unfortunately requires the password to be known to the server so we cannot hash it. So any improvements here would require a protocol extension, and getting that widely deployed among other VNC implementations. As for warning about the length, we already have #370 for that. So I'm afraid I'll close this as a duplicate, unless you have something more tangible to suggest for changing the authentication. |
commented Feb 22, 2018 • edited
edited
If the security of TigerVNC cannot be improved because it must be backwards compatible with intrinsically insecure VNC protocols of 20 years ago, then that should be documented on the head of every article on the website in bold red lettering. I was unable to find any overt or easy to find mentions about the weaknesses mentioned above: DES, 8 character max, stored insecurely where malware regularly scrape passwords. Does TigerVNC even thwart high-speed brute force password tries and failure attempts? Similarly, TigerVNC as a project needs to decide whether it wants to stick to being an obsolete backwards compatible program, or a modern and secure program, in a formal statement and liability waiver. There is clearly not enough urgency to discourage people from using TigerVNC. The site requires a statement that implores people to stop using this software, toot sweet. |
commented Feb 22, 2018
OK, seriously.. This is an open source project, and as the saying goes'free as in speech, not beer'. If this subject is of such vital importanceto you then why not jump in and help instead of making snarky comments? …On Thu, Feb 22, 2018 at 2:27 PM, a-raccoon ***@***.***> wrote: If the security of TigerZNC cannot be improved because it must be backwards compatable with intrinsically insecure ZNC protocols of 20 years ago, then that should be documented on the head of every article on the website in bold red lettering. I was unable to find any overt or easy to find mentions about the weaknesses mentioned above: DES, 8 character max, stored insecurely where malware regularly scrape passwords. Does TigerZNC even thwart high-speed brute force password tries and failure attempts? Similarly, TigerZNC as a project needs to decide whether it wants to stick to being an obsolete backwards compatible program, or a modern and secure program, in a formal statement and liability waiver. There is clearly not enough urgency to discourage people from using TigerZNC. The site requires a statement that implores people to stop using this software, toot sweet. — You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub <#601 (comment)>, or mute the thread <https://github.com/notifications/unsubscribe-auth/AHnWbcjyA_ZUN0celDwuQ-Mmj2NEROmIks5tXb-vgaJpZM4SO9h9> . |
commented Feb 22, 2018 • edited
edited
My remarks are anything but snarky. You also mistaken users who submit feedback, bug reports and security advisories as 'programmers who need to fix it for themselves or shut up.' This is not the case. |