VNC Honeypot
Detect unauthorized access attempts targeting VNC remote desktop services.
About VNC
VNC (Virtual Network Computing) provides platform-independent remote desktop access commonly used for server management, KVM-over-IP, and remote support. VNC is frequently found on internal networks managing headless servers, industrial systems, and lab environments. Unlike RDP, VNC often uses shared passwords rather than per-user authentication.
What Gets Captured
When an attacker attempts to connect using your VNC honeypot credentials, Tripwires captures:
- Auth response - The DES-encrypted authentication response
- Source IP - The attacker's IP address
- Timestamp - Exact time of the connection
- Client protocol version - The RFB protocol version negotiated
Connection Formats
VNC credentials can be planted in various formats depending on your environment:
VNC Viewer
vncviewer vnc-xxx.gettripwires.com:5900
TightVNC
tvnviewer vnc-xxx.gettripwires.com::5900
Python (vncdotool)
from vncdotool import api
client = api.connect('vnc-xxx.gettripwires.com', password='password')
client.captureScreen('screenshot.png')
SSH Tunnel + VNC
ssh -L 5900:vnc-xxx.gettripwires.com:5900 jumphost
vncviewer localhost:5900
Strategic Placement Ideas
Server KVM Access
Leave as 'IPMI/KVM console' access info in server management docs.
Lab Environment Docs
Add as 'test lab remote access' in development environment documentation.
Helpdesk Knowledge Base
Include as 'remote support tool' connection details in helpdesk guides.