I did this for ChunkVNC 3.2 with a compiled python script.
Code came from:
http://www.geekademy.com/2010/10/creati ... r-vnc.html
I just compiled it into vnc_hash.exe which will take a string (8 chars no spaces) as input and output the encrypted password.
You can download ChunkVNC 3.2 from the archive:
http://chunkvnc.com/archive/
Open a command window and navigate to ChunkVNC_3_2\SRC\vnc_hash
Type "vnc_hash.exe password" and hit enter, it should write "dbd83cfd727a1458" on the next line.
You can find the source code in the vnc_hash\SRC directory, it was compiled with py2exe.
Note: Look at the Compilers source code ChunkVNC_3_2\SRC\Compiler.au3 to find out how I read this information with AutoIt and put it into the ultravnc.ini file.
Code: Select all
Func GeneratePWD( ByRef $plaintextpwd )
; Read the console output of vnc_hash.exe after sending it a plaintext password to hash.
Local $vnchashexe = Run( @ComSpec & " /c SRC\vnc_hash\vnc_hash.exe " & $plaintextpwd, @ScriptDir, @SW_HIDE, $STDERR_CHILD + $STDOUT_CHILD)
Local $line
$line = StdoutRead( $vnchashexe ) ; First line is blank
Sleep( 1000 ) ; We have to wait a bit for the console app to write the hash.
$line = StdoutRead( $vnchashexe ) ; Read the hash.
$line = StringStripWS( $line, 2 ) & "00" ; Remove trailing whitespace and add 00. HACK: vnc_hash.exe should return with the trailing 00!
Return $line
EndFunc
ChunkVNC - Free PC Remote control with the Open Source UltraVNC wrapper InstantSupport!