Specialized Systems, Inc.
VNCPush Framework



VNCPush - Disclosure

  1. This application is not intended for cracking or any other offensive or unlawful activity. Use of this application requires authentication and has no brute force password (auth hammering) extensibility.

  2. There exists both network sniffing based VNC password crackers and brute force VNC password cracking utilities. Installing VNC poses a risk to workstations giving privileges to a Windows machine equal to that of the console user (less physical access).

  3. Traces of IPC$ and C$ access are left in the security event log. You can erase these by binding IPC$, and using the Computer Management MMC to access the remote target and clearing via GUI.

  4. All components of the VNC core application have been developed by AT&T research labs and modified by the developers at TridiaVNC. All VNC components are copyrights of their respective owners. The VNCPush application is a front-end for deploying the VNC application on Windows NT based machines via native SMB and RPC mappoints, once installed and connected, you are using 3rd party software.

  5. VNCPush includes four Microsoft utilities necessary for it's operation. These utilites are reg.exe, regini.exe, sc.exe, and rmtshare.exe (optional). These components located in the \bin directory are owned and copyrighted by Microsoft Corporation.