VNC (T1021.005)

View on ATT&CK

In Playbook

Associated Tactics

  • Lateral Movement

Lateral Movement (TA0008)

The adversary is trying to move through your environment. Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it. Reaching their objective often involves pivoting through multiple systems and accounts to gain. Adversaries might install their own remote access tools to accomplish Lateral Movement or use legitimate credentials with native network and operating system tools, which may be stealthier.

View on ATT&CK

Procedure Examples

Description Source(s)
Administrator, Penetration Testing Lab. (2012, October 30). Attacking VNC Servers. Retrieved October 6, 2021. Attacking VNC Servers PentestLab
Apple Support. (n.d.). Set up a computer running VNC software for Remote Desktop. Retrieved August 18, 2021. MacOS VNC software for Remote Desktop
Jay Pipes. (2013, December 23). Security Breach! Tenant A is seeing the VNC Consoles of Tenant B!. Retrieved September 12, 2024. Havana authentication bug
Nick Miles. (2017, November 30). Detecting macOS High Sierra root account without authentication. Retrieved September 20, 2021. macOS root VNC login without authentication
Offensive Security. (n.d.). VNC Authentication. Retrieved October 6, 2021. Offensive Security VNC Authentication Check
Pascal Nowack. (n.d.). Retrieved September 21, 2021. Gnome Remote Desktop grd-settings
Pascal Nowack. (n.d.). Retrieved September 21, 2021. Gnome Remote Desktop gschema
Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021. Apple Unified Log Analysis Remote Login and Screen Sharing
Sergiu Gatlan. (2019, November 22). Dozens of VNC Vulnerabilities Found in Linux, Windows Solutions. Retrieved September 20, 2021. VNC Vulnerabilities
T. Richardson, J. Levine, RealVNC Ltd.. (2011, March). The Remote Framebuffer Protocol. Retrieved September 20, 2021. The Remote Framebuffer Protocol
Tegan. (2019, August 15). Setting up System Authentication. Retrieved September 20, 2021. VNC Authentication
Z3RO. (2019, March 10). Day 70: Hijacking VNC (Enum, Brute, Access and Crack). Retrieved September 20, 2021. Hijacking VNC