Hi, I have been working with SET a little bit now and I have come across something on ALL of the SET exploit methods on my computer... I'll go through one example.
BT5 R3 on disk
Ok, so
Code:
cd /pentest/exploits/set/
Code:
/pentest/exploits/set# ./set
Then I go through my options...
1
2
2
1
Code:
[-] NAT/Port Forwarding can be used in the cases where your SET machine is
[-] not externally exposed and may be a different IP address than your reverse listener.
set> Are you using NAT/Port Forwarding [yes|no]: n
[-] Enter the IP address of your interface IP or if your using an external IP, what
[-] will be used for the connection back and to house the web server (your interface address)
set:webattack> IP address for the reverse connection:<my ip>
3 (Google for template)
33 for autopwn
2 for reverse_tcp meterpreter
Code:
set:payloads> Port to use for the reverse [443]:4444
Code:
[*] Cloning the website: http://www.google.com[*] This could take a little bit...[*] Injecting iframes into cloned website for MSF Attack....[*] Malicious iframe injection successful...crafting payload.
And my problem is here

I am not quite sure how to fix the database issue http://www.backtrack-linux.org/forum...confused.png:?

Help please. I haven't found ANY answers online through search