5800,5801,5900,5901 - Pentesting VNC
Basic Information
PORT STATE SERVICE
5900/tcp open vncEnumeration
nmap -sV --script vnc-info,realvnc-auth-bypass,vnc-title -p <PORT> <IP>
msf> use auxiliary/scanner/vnc/vnc_none_auth****Brute force
Connect to vnc using Kali
vncviewer [-passwd passwd.txt] <IP>::5901Decrypting VNC password
Shodan
Last updated