Loading...

「Neuromancer」 VNC authentication bypass + netcat shell

4,296 views

Loading...

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Dec 9, 2009

This is a simple tutorial that i've made showing how to exploit a remote host that uses a vulnerable VNC server version. Netcat can be used for many purposes, i show in this video how i created a piped cmd.exe, useful as method to obtain root in a machine. I consider this vulnerability the most easy to exploit since the "webfolders" bug in IIS 4/5, but its continues causing serious problems to admins.

more informations:
Secunia Advisory code: SA20107
US-CERT Vulnerability Note: VU#117929

Loading...

When autoplay is enabled, a suggested video will automatically play next.

Up next


to add this to Watch Later

Add to

Loading playlists...