Scrying – Collecting RDP, web and VNC Screenshots

Scrying is a tool that will allow penetration tester to Collect RDP, web and VNC Screenshots all in one place. This will be useful during the network scanning and discovery phase to display all available UI.

Scrying - Collecting RDP, web and VNC Screenshots all in one place
Scrying – Collecting RDP, web and VNC Screenshots all in one place

Some of the features with this tool are:

  •  Automatically decide whether an input should be treated as a web address or RDP server
  • Automatically create output directory if it does not already exist
  • Save images with consistent and unique filenames derived from the host/IP
  • Full support for IPv6 and IPv4 literals as well as hostnames
  • Read targets from a file and decide whether they’re RDP or HTTP or use hints
  • Parse targets smartly from Nmap and Nessus output
  • HTTP – uses Chromium/Chrome in headless mode
  • Full cross-platform support – tested on Linux, Windows and Mac
  • Produces an HTML report to allow easy browsing of the results
  • VNC

To be done features:

  • RDP – mostly working, does not support “plain RDP” mode, see #15
  • Video streams – tracking issue #5
  • option for timestamps in filenames
  • Read targets from a msf services -o csv output
  • OCR on RDP usernames, either live or on a directory of images
  • NLA/auth to test credentials
  • Parse Dirble JSON output to grab screenshots of an entire website – waiting for nccgroup/dirble#51

You can read more and download this tool over here: https://github.com/nccgroup/scrying

Share
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments