


An adversary could use VNC to remotely control and monitor a system to collect data and information to pivot to other systems within the network. Īdversaries may abuse VNC to perform malicious actions as the logged-on user such as opening documents, downloading files, and running arbitrary commands. By default, VNC uses the system's authentication, but it can be configured to use credentials specific to VNC. VNC differs from Remote Desktop Protocol as VNC is screen-sharing software rather than resource-sharing software. VNC is a platform-independent desktop sharing system that uses the RFB ("remote framebuffer") protocol to enable users to remotely control another computer’s display by relaying the screen, mouse, and keyboard inputs over the network. Adversaries may use Valid Accounts to remotely control machines using Virtual Network Computing (VNC).
