CVE Certified
GHDB

filetype:reg reg +intext:”WINVNC3”

prev next

Google search: filetype:reg reg +intext:”WINVNC3”

Hits: 3335

Submited: 2006-02-05

This can be used to get encoded vnc passwords which can otherwise be obtained by a local registry and decoded by cain & abel. The query find registry entries which can otherwise be found can locally in:\HKEY_CURRENT_USER\Software\ORL\WinVNC3\Password or\HKEY_USERS\.DEFAULT\Software\ORL\WinVNC3\PasswordIf you are a cain and abel user you'll and have used this feature before you will know how useful this query is. Other than decoded passwords you can also find other useful information on the VNC server and its security. I have successfully gained access to many VNC servers.