Hello,
Has anyone been able to create a command line console application that takes in a clear text password and could return a UltraVNC.ini password (HEX?)? It would be nice if a daily password could be attached to uVNC, instead of having a fixed static one.
What are all bits of source needed to tackle this? I'd like to give it a shot.
Thanks
9fofo
Update: UltraVNC 1.4.3.6 and UltraVNC SC 1.4.3.6: https://forum.uvnc.com/viewtopic.php?t=37885
Important: Please update to latest version before to create a reply, a topic or an issue: https://forum.uvnc.com/viewtopic.php?t=37864
Join us on social networks and share our announcements:
- Website: https://uvnc.com/
- GitHub: https://github.com/ultravnc
- Mastodon: https://mastodon.social/@ultravnc
- Facebook: https://www.facebook.com/ultravnc1
- X/Twitter: https://x.com/ultravnc1
- Reddit community: https://www.reddit.com/r/ultravnc
- OpenHub: https://openhub.net/p/ultravnc
Important: Please update to latest version before to create a reply, a topic or an issue: https://forum.uvnc.com/viewtopic.php?t=37864
Join us on social networks and share our announcements:
- Website: https://uvnc.com/
- GitHub: https://github.com/ultravnc
- Mastodon: https://mastodon.social/@ultravnc
- Facebook: https://www.facebook.com/ultravnc1
- X/Twitter: https://x.com/ultravnc1
- Reddit community: https://www.reddit.com/r/ultravnc
- OpenHub: https://openhub.net/p/ultravnc
Revolving Password
Re: Revolving Password
It would all be right in the UltraVNC source code. Just find how it takes the password and writes it out to the INI.
Re: Revolving Password
I did this for ChunkVNC 3.2 with a compiled python script.
Code came from: http://www.geekademy.com/2010/10/creati ... r-vnc.html
I just compiled it into vnc_hash.exe which will take a string (8 chars no spaces) as input and output the encrypted password.
You can download ChunkVNC 3.2 from the archive: http://chunkvnc.com/archive/
Open a command window and navigate to ChunkVNC_3_2\SRC\vnc_hash
Type "vnc_hash.exe password" and hit enter, it should write "dbd83cfd727a1458" on the next line.
You can find the source code in the vnc_hash\SRC directory, it was compiled with py2exe.
Note: Look at the Compilers source code ChunkVNC_3_2\SRC\Compiler.au3 to find out how I read this information with AutoIt and put it into the ultravnc.ini file.
Code came from: http://www.geekademy.com/2010/10/creati ... r-vnc.html
I just compiled it into vnc_hash.exe which will take a string (8 chars no spaces) as input and output the encrypted password.
You can download ChunkVNC 3.2 from the archive: http://chunkvnc.com/archive/
Open a command window and navigate to ChunkVNC_3_2\SRC\vnc_hash
Type "vnc_hash.exe password" and hit enter, it should write "dbd83cfd727a1458" on the next line.
You can find the source code in the vnc_hash\SRC directory, it was compiled with py2exe.
Note: Look at the Compilers source code ChunkVNC_3_2\SRC\Compiler.au3 to find out how I read this information with AutoIt and put it into the ultravnc.ini file.
Code: Select all
Func GeneratePWD( ByRef $plaintextpwd )
; Read the console output of vnc_hash.exe after sending it a plaintext password to hash.
Local $vnchashexe = Run( @ComSpec & " /c SRC\vnc_hash\vnc_hash.exe " & $plaintextpwd, @ScriptDir, @SW_HIDE, $STDERR_CHILD + $STDOUT_CHILD)
Local $line
$line = StdoutRead( $vnchashexe ) ; First line is blank
Sleep( 1000 ) ; We have to wait a bit for the console app to write the hash.
$line = StdoutRead( $vnchashexe ) ; Read the hash.
$line = StringStripWS( $line, 2 ) & "00" ; Remove trailing whitespace and add 00. HACK: vnc_hash.exe should return with the trailing 00!
Return $line
EndFunc
http://www.chunkvnc.com - ChunkVNC - Free PC Remote control with the Open Source UltraVNC wrapper InstantSupport!
Re: Revolving Password
Keep in mind that using an encryption plugin such as SecureVNC is a much better solution security wise but I've yet to find a command line way to generate keys for it.
http://www.chunkvnc.com - ChunkVNC - Free PC Remote control with the Open Source UltraVNC wrapper InstantSupport!