I just simply love mRemoteNG as a management tool. However they do say all passwords are securely stored! I’ve learned that it’s quiet easy to decrypt them. Just by performing these simple steps:
- Open mRemote and go to “Tools” > “External Tools”
- Right-click in the white space and choose “New External Tool”
- In the External Tools Properties, fill in a “Display Name”, “Filename” and some “arguments”.
- In this scenario I filled in "Password lookup", CMD and "/k echo %password%".
- Go to the connection where you would like to reveal the connection and right-click on it and choose “External tools” > “Password lookup.
You successfully decrypted the password.
Original: http://dynamic-datacenter.be/?p=168
最后一次更新于2019-07-22
0 comment