Mike, Check out the Foundstone guys, and in particular the guys who wrote the particularly poorly titled "Hacking Exposed". In the book, they discuss in detail all the ins and outs of remote control technology for a variety of products from pcAnywhere to Terminal Services, including a decent set of VNC weaknesses.
I spoke to a couple of them (George in particular) last year when I spoke at Blackhat, and they're quite decent guys. Feel free to approach them. Current VNC security weaknesses in order of exploitability: * reversible passwords - there simply is no excuse * MITM attacks http://www.securiteam.com/securitynews/5ZP0P1535W.html * the lack of username and passwords (one factor authentication) * non-existent registry security on NT * lack of a protocol tester to prove robustness and interoperability * running as LOCALSYSTEM on NT presents a huge remote buffer overrun risk as well as quite a decent local exploit target * the inbuilt web server on port 5800 is not necessary for most people, and is a good DoS target (look at code for greater clarity on this risk) * buffer / heap overflow possible in functions using VSocket::GetPeerName() and %s expansion (this one is doable, trust me) * it's probably possible to connect to the same port over and over again to avoid the inbuilt authentication brute-force limiters. Phoss is a perfect example of a tool that could be used again if they look carefully. The list will probably go on and on. This is one of the reasons I've been working on and off on RFB 4.0, which basically ditches the RFB handshake in favor of something cryptographically secure. However, protocol level weaknesses aside, the backwards compatibility element plus a load of old code that no one is really going through with a fine tooth comb presents a boat load of residual risk. Good luck with the presentation! Andrew -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Michael Ossmann Sent: Tuesday, 5 March 2002 10:50 AM To: [EMAIL PROTECTED] Subject: Thin client security presentation I will be speaking at Rubi Con (http://www.rubi-con.org/) in April about thin client and remote desktop security. I'll discuss Citrix, Tarantella, VNC, the X window system, Windows Terminal Services, and possibly some other things. Firstly, I'd like to invite everyone. If you are attending Rubi Con, I'd love to meet you. Secondly, I'm gathering information for my presentation. If you have any links to security information on VNC or any of the other technologies, I'd appreciate an email. I have quite a bit of material already, but I'd like to fill in as many gaps in my knowledge as possible before I get bombarded with questions. :-) Thanks, Mike -- Mike Ossmann, Tarantella/UNIX Engineer/Instructor Alternative Technology, Inc. http://www.alttech.com/ --------------------------------------------------------------------- To unsubscribe, mail [EMAIL PROTECTED] with the line: 'unsubscribe vnc-list' in the message BODY See also: http://www.uk.research.att.com/vnc/intouch.html --------------------------------------------------------------------- --------------------------------------------------------------------- To unsubscribe, mail [EMAIL PROTECTED] with the line: 'unsubscribe vnc-list' in the message BODY See also: http://www.uk.research.att.com/vnc/intouch.html ---------------------------------------------------------------------