Jump to content

Metasploitable 2 distcc_exec Exploit completed, but no session was created


Recommended Posts

  • 3 months later...

I got the same error.

This seems to be a problem on the Metasploitable host. The bash does not support redirections via TCP (/dev/tcp/x.x.x.x/xxxx)

In msf6 it seems to use a new mechanism ignoring that some host will not support 😞 it.

Try to use another payload with

msf6 exploit(unix/misc/distcc_exec) > set PAYLOAD cmd/unix/reverse_perl

This works because Perl is available in Metasploitable.

Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...