Noromyxo Posted September 22, 2022 Share Posted September 22, 2022 I'm using MSF6 in Kali running in a VirtualBox VM. I'm going through the Rapid7 documentation for Metasploitable 2 for distcc_exec. I can find the distcc_exec exploit just fine. I can also set the RHOST option just fine. However, when I type in exploit, I get this error: Exploit completed, but no session was creaed. Any ideas? Link to comment Share on other sites More sharing options...
Andy189 Posted January 5, 2023 Share Posted January 5, 2023 I got the same error. This seems to be a problem on the Metasploitable host. The bash does not support redirections via TCP (/dev/tcp/x.x.x.x/xxxx) In msf6 it seems to use a new mechanism ignoring that some host will not support 😞 it. Try to use another payload with msf6 exploit(unix/misc/distcc_exec) > set PAYLOAD cmd/unix/reverse_perl This works because Perl is available in Metasploitable. Link to comment Share on other sites More sharing options...
Andy189 Posted January 5, 2023 Share Posted January 5, 2023 msf6 exploit(unix/misc/distcc_exec) > set PAYLOAD cmd/unix/reverse Will also work. This seems to be the old default payload from msf5. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.