Update: UltraVNC 1.4.3.6 and UltraVNC SC 1.4.3.6: https://forum.uvnc.com/viewtopic.php?t=37885
Important: Please update to latest version before to create a reply, a topic or an issue: https://forum.uvnc.com/viewtopic.php?t=37864

Join us on social networks and share our announcements:
- Website: https://uvnc.com/
- GitHub: https://github.com/ultravnc
- Mastodon: https://mastodon.social/@ultravnc
- Facebook: https://www.facebook.com/ultravnc1
- X/Twitter: https://x.com/ultravnc1
- Reddit community: https://www.reddit.com/r/ultravnc
- OpenHub: https://openhub.net/p/ultravnc

Revolving Password

Developers may discuss here
Post Reply
ninefofo
Posts: 6
Joined: 2011-10-14 15:10

Revolving Password

Post by ninefofo »

Hello,

Has anyone been able to create a command line console application that takes in a clear text password and could return a UltraVNC.ini password (HEX?)? It would be nice if a daily password could be attached to uVNC, instead of having a fixed static one.

What are all bits of source needed to tackle this? I'd like to give it a shot. :thumbs:

Thanks

9fofo
:mrgreen:
B
800
800
Posts: 2338
Joined: 2009-09-09 14:05

Re: Revolving Password

Post by B »

It would all be right in the UltraVNC source code. Just find how it takes the password and writes it out to the INI.
B
800
800
Posts: 2338
Joined: 2009-09-09 14:05

Re: Revolving Password

Post by B »

User avatar
supercoe
400
400
Posts: 1732
Joined: 2009-07-20 21:27
Location: Walker, MN
Contact:

Re: Revolving Password

Post by supercoe »

I did this for ChunkVNC 3.2 with a compiled python script.

Code came from: http://www.geekademy.com/2010/10/creati ... r-vnc.html

I just compiled it into vnc_hash.exe which will take a string (8 chars no spaces) as input and output the encrypted password.

You can download ChunkVNC 3.2 from the archive: http://chunkvnc.com/archive/
Open a command window and navigate to ChunkVNC_3_2\SRC\vnc_hash
Type "vnc_hash.exe password" and hit enter, it should write "dbd83cfd727a1458" on the next line.

You can find the source code in the vnc_hash\SRC directory, it was compiled with py2exe.

Note: Look at the Compilers source code ChunkVNC_3_2\SRC\Compiler.au3 to find out how I read this information with AutoIt and put it into the ultravnc.ini file.

Code: Select all

Func GeneratePWD( ByRef $plaintextpwd )

	; Read the console output of vnc_hash.exe after sending it a plaintext password to hash.
	Local $vnchashexe = Run( @ComSpec & " /c SRC\vnc_hash\vnc_hash.exe " & $plaintextpwd, @ScriptDir, @SW_HIDE, $STDERR_CHILD + $STDOUT_CHILD)
	Local $line

	$line = StdoutRead( $vnchashexe ) ; First line is blank
	Sleep( 1000 )			          ; We have to wait a bit for the console app to write the hash.
	$line = StdoutRead( $vnchashexe ) ; Read the hash.
	$line = StringStripWS( $line, 2 ) & "00" ; Remove trailing whitespace and add 00. HACK: vnc_hash.exe should return with the trailing 00!
	Return $line

EndFunc
http://www.chunkvnc.com - ChunkVNC - Free PC Remote control with the Open Source UltraVNC wrapper InstantSupport!
User avatar
supercoe
400
400
Posts: 1732
Joined: 2009-07-20 21:27
Location: Walker, MN
Contact:

Re: Revolving Password

Post by supercoe »

Keep in mind that using an encryption plugin such as SecureVNC is a much better solution security wise but I've yet to find a command line way to generate keys for it.
http://www.chunkvnc.com - ChunkVNC - Free PC Remote control with the Open Source UltraVNC wrapper InstantSupport!
Post Reply