vncspy Code
Status: Beta
Brought to you by:
smilindog2000
| File | Date | Author | Commit |
|---|---|---|---|
| doc | 2006-10-25 | smilindog2000 | [r1] /home/bill/projects/vncspy: Initial files |
| README | 2006-10-25 | smilindog2000 | [r1] /home/bill/projects/vncspy: Initial files |
| makefile | 2006-10-25 | smilindog2000 | [r1] /home/bill/projects/vncspy: Initial files |
| makerel | 2006-10-25 | smilindog2000 | [r1] /home/bill/projects/vncspy: Initial files |
| postweb | 2006-10-25 | smilindog2000 | [r1] /home/bill/projects/vncspy: Initial files |
| vncspy.c | 2006-10-25 | smilindog2000 | [r1] /home/bill/projects/vncspy: Initial files |
| vncspyd | 2006-10-25 | smilindog2000 | [r1] /home/bill/projects/vncspy: Initial files |
Most people are unaware that VNC is HIGHLY INSECURE. To help them understand, I wrote this tiny
program, vncspy. All it does is sniff network traffic, and report VNC key strokes that it sees.
So, for example, if an engineer insists on using VNC to log in from his Windows machine into your
network whenever he wants from home, try leaving vncspy running for a while. I like to use the
command:
sudo vncspy eth0 | tee keylog
Note that you need to run vncspy as root. You can either su root, or sudo.
This will sniff all keystrokes he enters from home to his VNC server. Assuming he has to enter
his user name and password to log-on, you should see his user name in the keylog, followed by his
password. It's that simple!
When you get his password, try writing it on a sticky-note, and pasting it on his monitor. I've
found showing people their passwords to be very effective at improving their security habits.
Usage
-----
vncspy must be run as root. It takes only one optional parameter, the interface to sniff on. If
left out, it will use the first interface on your system, typically eth0.
Compling
--------
The only major dependency for vncspy is the pcap development library. On Debian or Ubuntu, you
may issue a command like:
sudo apt-get install libpcap0.8-dev
If your system does not have libpcap available, you can install it from source from:
http://www.tcpdump.org.
Once you have libpcap, compiling vncspy is simple. Just type:
make
It should create the vncspy program. Let me know if you need help.
Installing as a demon
---------------------
The vncspyd file is a script that can be be executed at boot time to enable logging VNC keystrokes
to /var/log/vncspy. To enable it, first copy it to /etc/init.d, and copy vncspy to /sbin:
su
cp vncspy /sbin
cp vncspyd /etc/init.d
cd /etc/init.d
On Debian/Ubuntu, enable it with:
update-rc.d vncspyd defaults
On Fedora/RedHat, enable it with:
chkconfig --add vncspyd
Note that if you have more than one network card, you can edit vncspyd to pick a specific one.
Author
------
Bill Cox
bill@billrocks.org
I copied most of this code from the Internet, and now can't remeber who I copied from!
Thanks, whoever you are!