Jump to content

Metasploitable 2 distcc_exec Exploit completed, but no session was created


Recommended Posts

  • 3 months later...

I got the same error.

This seems to be a problem on the Metasploitable host. The bash does not support redirections via TCP (/dev/tcp/x.x.x.x/xxxx)

In msf6 it seems to use a new mechanism ignoring that some host will not support 😞 it.

Try to use another payload with

msf6 exploit(unix/misc/distcc_exec) > set PAYLOAD cmd/unix/reverse_perl

This works because Perl is available in Metasploitable.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...