SET - Troubles with SpearPhishing / FileFormat Payload
Anyone else having problems trying to use SET - Spear Phishing?
I've been trying to get a fileformat payload created but I keep running into problems.
I've tried running the defaults. And specifically jbig2decode because Dave talks about it in the tutorial. And I've been using meterpreter x64 reverse tcp. It seems like no payload is being created at all. I've searched for it but cant find anything.
Currently running revision 585, but I think its gone up a couple times today.
How's everyone else making out?