Noromyxo Posted September 22, 2022 Share Posted September 22, 2022 I'm using MSF6 in Kali running in a VirtualBox VM. I'm going through the Rapid7 documentation for Metasploitable 2 for distcc_exec. I can find the distcc_exec exploit just fine. I can also set the RHOST option just fine. However, when I type in exploit, I get this error: Exploit completed, but no session was creaed. Any ideas? Quote Link to comment Share on other sites More sharing options...
Andy189 Posted January 5 Share Posted January 5 I got the same error. This seems to be a problem on the Metasploitable host. The bash does not support redirections via TCP (/dev/tcp/x.x.x.x/xxxx) In msf6 it seems to use a new mechanism ignoring that some host will not support 😞 it. Try to use another payload with msf6 exploit(unix/misc/distcc_exec) > set PAYLOAD cmd/unix/reverse_perl This works because Perl is available in Metasploitable. Quote Link to comment Share on other sites More sharing options...
Andy189 Posted January 5 Share Posted January 5 msf6 exploit(unix/misc/distcc_exec) > set PAYLOAD cmd/unix/reverse Will also work. This seems to be the old default payload from msf5. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.