Detecting VNC without a password

Not applicable

Detecting VNC without a password

Has anybody tried to create a custom siganture, (or has it been discussed as a native signature by Palo Alto), for detecting a VNC session initiated without a password challenge/response? It seems like this would be a useful audit notification to protect against the everpresent layer 8 threat...

Tags (2)
L5 Sessionator

Re: Detecting VNC without a password

Hello,

This is an interesting idea. I haven't heard of anyone attempting it.

We have a forum that is more suitable for this query, I'd suggest that you post it in our DevCenter:

https://live.paloaltonetworks.com/community/devcenter

Also, you can submit this idea to our content team for them to possibly create it in the future by going to the following link:

http://www.paloaltonetworks.com/researchcenter/submit-an-application/


Thanks,

Jason Seals

Not applicable

Re: Detecting VNC without a password

Hi Jason,

Thanks for the feedback. I moved the thread to DevCenter, submitted an application request (and I also checked with Palo Alto support via the ticket system). If I find out anything else, I will post it here for reference!

L5 Sessionator

Re: Detecting VNC without a password

Hi,

That sounds great. Please keep us informed.

Thanks,

Jason

SRA
L4 Transporter

Re: Detecting VNC without a password

The threat research team is investigating if this can be covered using a vulnerability signature in a future content update.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!