very useful!! I'm doing my lab and I was stuck with some stderr. wasn't sure what to do next, I've tried set manual payload, but with no luck, and thanks to your advice to try other payloads it actually worked. so, you've made my day. thanks very much!!!
thank you so much for this!!! It seems entering a payload wasn`t always required for this module and has really confused why the exploit didn't run like the guides from earlier years showed
Very good video. Anyway I would thank you really much if you can explain the Python script part by part because I want to understand how exactly this RCE is made of, didn’t found in the internet a full explanation of the vulnerability
@@officialexploitacademy I get an error saying exploit failed, connection refused. Could it be because I only installed distcc on the machine that is being attacked? Do I have to set up distcc for this exploit to work?
very useful!! I'm doing my lab and I was stuck with some stderr. wasn't sure what to do next, I've tried set manual payload, but with no luck, and thanks to your advice to try other payloads it actually worked. so, you've made my day. thanks very much!!!
Glad it helped!
thank you so much for this!!! It seems entering a payload wasn`t always required for this module and has really confused why the exploit didn't run like the guides from earlier years showed
You’re welcome!
Awesome! Great Editing!
Thank you!
Awesome! Thank you so much!
That was awesome! So helpful! Thanks!
really good video!
Very good video. Anyway I would thank you really much if you can explain the Python script part by part because I want to understand how exactly this RCE is made of, didn’t found in the internet a full explanation of the vulnerability
Nice video. It would have been more useful if you could show how to escalate daemon's privileges to become root.
Is it possible to use Ubuntu 20 instead of Metasploitable2?
Sure, If you could install DistCC on it
@@officialexploitacademy I get an error saying exploit failed, connection refused. Could it be because I only installed distcc on the machine that is being attacked? Do I have to set up distcc for this exploit to work?
@@kamillorek6159 well it has to be the same version of DistCC and of course it has to be up and running to receive the exploit
@@officialexploitacademy Another question, do you have any solution to this exploit to stop it from working?
@@kamillorek6159 update DistCC. You shouldn’t be using this version, it’s severely outdated