Skip to content
This repository has been archived by the owner on Apr 7, 2024. It is now read-only.

Commit

Permalink
tester initial commit
Browse files Browse the repository at this point in the history
  • Loading branch information
magisterquis committed Aug 27, 2017
1 parent 1dcd516 commit ed1fd6d
Show file tree
Hide file tree
Showing 3 changed files with 643 additions and 2 deletions.
11 changes: 9 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,10 +24,17 @@ Pull requests are welcome.

Cracker
-------
In the [cracker](./cracker/) directory is a simple program to try to crack the
handshakes logged in John The Ripper format. See its
In the [cracker](./cracker/) directory there is a simple program to try to
crack the handshakes logged in John The Ripper format. See its
[README](./cracker/README.md) for more details.

Tester
------
In the [tester](./tester/) directory there is a simple program to generate VNC
authentication attepmts, for use in testing vnclowpot, as well as being
production-grade for pentesting. See its [README](./tester/README.md) for more
details.

Windows
-------
Should probably work.
24 changes: 24 additions & 0 deletions tester/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
tester
======
Tester can be used to generate hashes for testing vnclowpot, as well as testing
VNC security.

Please run it with `-h` for a complete listing of options

For legal use only.

Example
-------
```bash
./tester -wordlist passwords.txt 192.168.1.2 192.168.1.3
```

Details
-------
Tester is nothing more than a VNC brute-forcer with the nice side-effect of
causing vnclowpot to log known hashes (plus a handful of features useful for
pentesters and such). Please don't use it for illegal purposes.

Only protocol 3.8 with VNC Authentication is supported. As this is what is
used by vnclowpot, there are no plans to support other protocol versions. Pull
requests are welcome.
Loading

0 comments on commit ed1fd6d

Please sign in to comment.