computerlarry
asked on
Is TightVNC easily hacked on Windows 10 ?
Windows 10 laptop has TightVNC installed. (We use TightVNC because we want to use Apple's Remote Desktop to control the computer, and TightVNC works with ARD)
Just 15 minutes ago the user looked at the computer to find that TightVNC was in use by some unknown user. The visitor left when they determined that we were aware of them.
We shut down TightVNC. Unfortunately the log was turned off (maybe by the visitor).
The SonicWALL Network Security Appliance does allow access to the computer.
Could someone have portscanned for Ports 22, 3283, and 5900, and then used a password hack of some sort? A primary password was set, and the user did have a normal word for the administrative password.
In the meantime, I'm going to bleepingcomputer.com and I'll run all the intrusion tests they have.
Thanks.
Just 15 minutes ago the user looked at the computer to find that TightVNC was in use by some unknown user. The visitor left when they determined that we were aware of them.
We shut down TightVNC. Unfortunately the log was turned off (maybe by the visitor).
The SonicWALL Network Security Appliance does allow access to the computer.
Could someone have portscanned for Ports 22, 3283, and 5900, and then used a password hack of some sort? A primary password was set, and the user did have a normal word for the administrative password.
In the meantime, I'm going to bleepingcomputer.com and I'll run all the intrusion tests they have.
Thanks.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Yes, DES is very weak cipher and can be brute forced. TVNC is just not strong at securing the channel (via ssh or openVPN) and enforcing authentication. Suggest the password be changed to stronger passphrase and move forward to harden (if still intend to stick with TVNC)
To protect the machine from unauthorized access, you should set passwords for VNC
authentication. Follow these instructions:
1. Click the TightVNC Server/Service tray icon.
2. In the "Server" tab, check "Require VNC authentication".
3. Set passwords for full-control access (Primary password) and view-only access (View-only
password).
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
So many great answers! Very appreciative.
ASKER