{"id":56,"date":"2014-01-06T19:27:00","date_gmt":"2014-01-06T19:27:00","guid":{"rendered":"https:\/\/www.tech-and-dev.com\/blog\/2014\/01\/06\/connecting-to-vnc-server-securely-with-putty-on-windows\/"},"modified":"2021-02-22T01:02:01","modified_gmt":"2021-02-22T01:02:01","slug":"connecting-to-vnc-server-securely-with-putty-on-windows","status":"publish","type":"post","link":"https:\/\/www.tech-and-dev.com\/blog\/2014\/01\/connecting-to-vnc-server-securely-with-putty-on-windows.html","title":{"rendered":"Connecting to VNC Server Securely With Putty On Windows"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left;\">\n<p>&nbsp;<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.tech-and-dev.com\/blog\/wp-content\/uploads\/2021\/02\/Putty.png\"><img decoding=\"async\" title=\"Connecting to VNC Server Securely With Putty On Windows\" src=\"https:\/\/www.tech-and-dev.com\/blog\/wp-content\/uploads\/2021\/02\/Putty.png\" alt=\"putty vnc windows ssh tunneling\" border=\"0\" \/><\/a><\/div>\n<div style=\"text-align: justify;\">In my previous post <a href=\"http:\/\/www.tech-and-dev.com\/2012\/12\/installing-vnc-server-on-centos.html\" target=\"_blank\" rel=\"noopener\">Installing VNC Server on CentOS<\/a>, I showed you how to install, configure and connect to a VNC Server on CentOS. However, this connection from the client to the server is not secure, and the password sent to the server is sent as plain text over an unsecure channel.<\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\">In order to secure the VNC connection and encrypt all the data sent, SSH tunneling can be used to prevent the data from being sent as plain text from the client to the server.<\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\">SSH Tunneling can be easily created with Putty on windows. Putty can be downloaded from <a href=\"http:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/download.html\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/div>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\">Open Putty, and write the IP address or hostname of the server:<\/div>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.tech-and-dev.com\/blog\/wp-content\/uploads\/2021\/02\/putty-open.png\"><img decoding=\"async\" title=\"Putty\" src=\"https:\/\/www.tech-and-dev.com\/blog\/wp-content\/uploads\/2021\/02\/putty-open.png\" alt=\"Putty Open Session\" border=\"0\" \/><\/a><\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">Go to SSH =&gt; Auth =&gt; Tunnels and write the IP Address and port number of your VNC server and click <b>Add<\/b>.<\/div>\n<div style=\"text-align: justify;\">Note: All VNC ports start with 590X, where X is the number that you defined on your server in <i>\/etc\/sysconfig\/vncserver<\/i>. In my example, I&#8217;ll assume I assigned the number 5 as my port, so the port in Putty will be 5905. (Make sure your replace<b> xxx.xxx.xxx.xxx<\/b> by your real server ip or hostname).<\/div>\n<p>&nbsp;<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.tech-and-dev.com\/blog\/wp-content\/uploads\/2021\/02\/putty-tunnel.png\"><img decoding=\"async\" title=\"Putty Tunneling Configuration\" src=\"https:\/\/www.tech-and-dev.com\/blog\/wp-content\/uploads\/2021\/02\/putty-tunnel.png\" alt=\"Putty Tunneling Configuration\" border=\"0\" \/><\/a><\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">Now either click &#8220;<b>Open<\/b>&#8220;, or go Back to\u00a0 &#8220;<b>Session<\/b>&#8221; and save the session, so that you don&#8217;t have to re-write the info everytime.<\/div>\n<div style=\"text-align: justify;\">After clicking open, login to your server and make sure you have your VNC server installed and started.<\/div>\n<blockquote>\n<blockquote><p>service vncserver restart<\/p><\/blockquote>\n<\/blockquote>\n<div style=\"text-align: justify;\"><\/div>\n<div style=\"text-align: justify;\">Open your VNC Viewer client, and write your localhost IP (always 127.0.0.1) followed by the port number as follows (port number is 5 in my case), and click Connect:<\/div>\n<p>&nbsp;<\/p>\n<div style=\"clear: both; text-align: center;\"><\/div>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.tech-and-dev.com\/blog\/wp-content\/uploads\/2021\/02\/vnc-viewer.png\"><img loading=\"lazy\" decoding=\"async\" title=\"VNC Viewer\" src=\"https:\/\/www.tech-and-dev.com\/blog\/wp-content\/uploads\/2021\/02\/vnc-viewer.png\" alt=\"vnc viewer\" width=\"320\" height=\"167\" border=\"0\" \/><\/a><\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">Enter your VNC password and click OK. Your connection to the server should be tunneled and secured.<\/div>\n<p><b>Any questions or suggestions? Please leave a comment below!<\/b><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; In my previous post Installing VNC Server on CentOS, I showed you how to install, configure and connect to a VNC Server on CentOS. However, this connection from the client to the server is not secure, and the password sent to the server is sent as plain text over an unsecure channel. In order [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[52,7,51,50,2],"tags":[],"class_list":["post-56","post","type-post","status-publish","format-standard","hentry","category-putty","category-ssh","category-tunneling","category-vnc","category-windows"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/posts\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":2,"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"predecessor-version":[{"id":247,"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/posts\/56\/revisions\/247"}],"wp:attachment":[{"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tech-and-dev.com\/blog\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}