Skip to content

Instantly share code, notes, and snippets.

@stephenmw
Last active March 5, 2023 17:55
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save stephenmw/f10c46ae0cf64b08bf93a062cd11f72f to your computer and use it in GitHub Desktop.
Save stephenmw/f10c46ae0cf64b08bf93a062cd11f72f to your computer and use it in GitHub Desktop.
root@ubuntu:~# export $(/usr/share/epoptes-client/get-display); x11vnc -connect localhost:5500
###############################################################
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
#@ @#
#@ ** WARNING ** WARNING ** WARNING ** WARNING ** @#
#@ @#
#@ YOU ARE RUNNING X11VNC WITHOUT A PASSWORD!! @#
#@ @#
#@ This means anyone with network access to this computer @#
#@ may be able to view and control your desktop. @#
#@ @#
#@ >>> If you did not mean to do this Press CTRL-C now!! <<< @#
#@ @#
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
#@ @#
#@ You can create an x11vnc password file by running: @#
#@ @#
#@ x11vnc -storepasswd password /path/to/passfile @#
#@ or x11vnc -storepasswd /path/to/passfile @#
#@ or x11vnc -storepasswd @#
#@ @#
#@ (the last one will use ~/.vnc/passwd) @#
#@ @#
#@ and then starting x11vnc via: @#
#@ @#
#@ x11vnc -rfbauth /path/to/passfile @#
#@ @#
#@ an existing ~/.vnc/passwd file from another VNC @#
#@ application will work fine too. @#
#@ @#
#@ You can also use the -passwdfile or -passwd options. @#
#@ (note -passwd is unsafe if local users are not trusted) @#
#@ @#
#@ Make sure any -rfbauth and -passwdfile password files @#
#@ cannot be read by untrusted users. @#
#@ @#
#@ Use x11vnc -usepw to automatically use your @#
#@ ~/.vnc/passwd or ~/.vnc/passwdfile password files. @#
#@ (and prompt you to create ~/.vnc/passwd if neither @#
#@ file exists.) Under -usepw, x11vnc will exit if it @#
#@ cannot find a password to use. @#
#@ @#
#@ @#
#@ Even with a password, the subsequent VNC traffic is @#
#@ sent in the clear. Consider tunnelling via ssh(1): @#
#@ @#
#@ http://www.karlrunge.com/x11vnc/#tunnelling @#
#@ @#
#@ Or using the x11vnc SSL options: -ssl and -stunnel @#
#@ @#
#@ Please Read the documentation for more info about @#
#@ passwords, security, and encryption. @#
#@ @#
#@ http://www.karlrunge.com/x11vnc/faq.html#faq-passwd @#
#@ @#
#@ To disable this warning use the -nopw option, or put @#
#@ 'nopw' on a line in your ~/.x11vncrc file. @#
#@ @#
#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#
###############################################################
05/03/2023 17:54:48 x11vnc version: 0.9.16 lastmod: 2019-01-05 pid: 61144
05/03/2023 17:54:48 Using X display :0
05/03/2023 17:54:48 rootwin: 0x771 reswin: 0x1200001 dpy: 0x8bced930
05/03/2023 17:54:48
05/03/2023 17:54:48 ------------------ USEFUL INFORMATION ------------------
05/03/2023 17:54:48 X DAMAGE available on display, using it for polling hints.
05/03/2023 17:54:48 To disable this behavior use: '-noxdamage'
05/03/2023 17:54:48
05/03/2023 17:54:48 Most compositing window managers like 'compiz' or 'beryl'
05/03/2023 17:54:48 cause X DAMAGE to fail, and so you may not see any screen
05/03/2023 17:54:48 updates via VNC. Either disable 'compiz' (recommended) or
05/03/2023 17:54:48 supply the x11vnc '-noxdamage' command line option.
05/03/2023 17:54:48
05/03/2023 17:54:48 Wireframing: -wireframe mode is in effect for window moves.
05/03/2023 17:54:48 If this yields undesired behavior (poor response, painting
05/03/2023 17:54:48 errors, etc) it may be disabled:
05/03/2023 17:54:48 - use '-nowf' to disable wireframing completely.
05/03/2023 17:54:48 - use '-nowcr' to disable the Copy Rectangle after the
05/03/2023 17:54:48 moved window is released in the new position.
05/03/2023 17:54:48 Also see the -help entry for tuning parameters.
05/03/2023 17:54:48 You can press 3 Alt_L's (Left "Alt" key) in a row to
05/03/2023 17:54:48 repaint the screen, also see the -fixscreen option for
05/03/2023 17:54:48 periodic repaints.
05/03/2023 17:54:48
05/03/2023 17:54:48 XFIXES available on display, resetting cursor mode
05/03/2023 17:54:48 to: '-cursor most'.
05/03/2023 17:54:48 to disable this behavior use: '-cursor arrow'
05/03/2023 17:54:48 or '-noxfixes'.
05/03/2023 17:54:48 using XFIXES for cursor drawing.
05/03/2023 17:54:48 GrabServer control via XTEST.
05/03/2023 17:54:48
05/03/2023 17:54:48 Scroll Detection: -scrollcopyrect mode is in effect to
05/03/2023 17:54:48 use RECORD extension to try to detect scrolling windows
05/03/2023 17:54:48 (induced by either user keystroke or mouse input).
05/03/2023 17:54:48 If this yields undesired behavior (poor response, painting
05/03/2023 17:54:48 errors, etc) it may be disabled via: '-noscr'
05/03/2023 17:54:48 Also see the -help entry for tuning parameters.
05/03/2023 17:54:48 You can press 3 Alt_L's (Left "Alt" key) in a row to
05/03/2023 17:54:48 repaint the screen, also see the -fixscreen option for
05/03/2023 17:54:48 periodic repaints.
05/03/2023 17:54:48
05/03/2023 17:54:48 XKEYBOARD: number of keysyms per keycode 7 is greater
05/03/2023 17:54:48 than 4 and 51 keysyms are mapped above 4.
05/03/2023 17:54:48 Automatically switching to -xkb mode.
05/03/2023 17:54:48 If this makes the key mapping worse you can
05/03/2023 17:54:48 disable it with the "-noxkb" option.
05/03/2023 17:54:48 Also, remember "-remap DEAD" for accenting characters.
05/03/2023 17:54:48
05/03/2023 17:54:48 X FBPM extension not supported.
05/03/2023 17:54:48 X display is capable of DPMS.
05/03/2023 17:54:48 --------------------------------------------------------
05/03/2023 17:54:48
05/03/2023 17:54:48 Default visual ID: 0x21
05/03/2023 17:54:48 Read initial data from X display into framebuffer.
05/03/2023 17:54:48 initialize_screen: fb_depth/fb_bpp/fb_Bpl 24/32/7680
05/03/2023 17:54:48
05/03/2023 17:54:48 X display :0 is 32bpp depth=24 true color
05/03/2023 17:54:48
05/03/2023 17:54:48 Autoprobing TCP port
05/03/2023 17:54:48 Autoprobing selected TCP port 5900
05/03/2023 17:54:48 Autoprobing TCP6 port
05/03/2023 17:54:48 Autoprobing selected TCP6 port 5900
05/03/2023 17:54:48 listen6: bind: Address already in use
05/03/2023 17:54:48 Not listening on IPv6 interface.
05/03/2023 17:54:48
05/03/2023 17:54:48 Xinerama is present and active (e.g. multi-head).
05/03/2023 17:54:48 Xinerama: number of sub-screens: 1
05/03/2023 17:54:48 Xinerama: no blackouts needed (only one sub-screen)
05/03/2023 17:54:48
X11 MIT Shared Memory Attach failed:
Is your DISPLAY=:0 on a remote machine?
Suggestion, use: x11vnc -display :0 ... for local display :0
caught X11 error:
05/03/2023 17:54:48 deleted 60 tile_row polling images.
X Error of failed request: BadAccess (attempt to access private resource denied)
Major opcode of failed request: 130 (MIT-SHM)
Minor opcode of failed request: 1 (X_ShmAttach)
Serial number of failed request: 56
Current serial number in output stream: 118
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment