Noromyxo Posted September 22, 2022 Posted September 22, 2022 I'm using MSF6 in Kali running in a VirtualBox VM. I'm going through the Rapid7 documentation for Metasploitable 2 for distcc_exec. I can find the distcc_exec exploit just fine. I can also set the RHOST option just fine. However, when I type in exploit, I get this error: Exploit completed, but no session was creaed. Any ideas?
Andy189 Posted January 5, 2023 Posted January 5, 2023 I got the same error. This seems to be a problem on the Metasploitable host. The bash does not support redirections via TCP (/dev/tcp/x.x.x.x/xxxx) In msf6 it seems to use a new mechanism ignoring that some host will not support 😞 it. Try to use another payload with msf6 exploit(unix/misc/distcc_exec) > set PAYLOAD cmd/unix/reverse_perl This works because Perl is available in Metasploitable.
Andy189 Posted January 5, 2023 Posted January 5, 2023 msf6 exploit(unix/misc/distcc_exec) > set PAYLOAD cmd/unix/reverse Will also work. This seems to be the old default payload from msf5.
Recommended Posts
Archived
This topic is now archived and is closed to further replies.