Oh cool =) I'll check it out.
On 5/16/06, H D Moore <[EMAIL PROTECTED]> wrote:
No need to patch the client at all. The Metasploit Framework module
proxies the connection and lets you exploit the flaw with any standard
client. If you have vncviewer in your path (or are running the Windows
version of the Framework), it also auto-connects :-)

-HD

http://metasploit.com/projects/Framework/exploits.html#realvnc_41_bypass

On Tuesday 16 May 2006 12:22, evilrabbi wrote:
> Hello,
>
> In case anyone was having trouble patching the vnc client I've supplied
> a patched binary that can be downloaded at
> http://www.nopsled.net/code/vncviewer.exe. <http://www.nopsled.net/code/
>vncviewer.exe>
>
> -- evilrabbi

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/



--
-- h0 h0 h0 --
www.nopsled.net
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to