LINUX - DISTCC
- Layout for this exercise:

- distcc is a program to distribute compilation or builds of C, C++, Objective C or Objective C++ code across several machines on a network. Metasploit provides an exploit to take control of a system running distcc:

- The payload cmd/unix/reverse triggers a reverse shell connection:

- Required options are remote and local hosts:

- Setting RHOST (victim) and LHOST (attacker):

- Launching the exploit, the result is a remote shell on the victim:
