一、在SET工具包根目录下的config/set_config文件中配置
参考SET作者的David Kennedy编写的《Metasploit渗透测试指南》2012年第1版
二、在SET工具包根目录下的config/set_config文件中配置
来自SET 2022/8最新版8.0.3
内置/usr/share/set/readme/的《User_Manual.pdf》
SET User Manual
Made for SET 6.0
root@bt:/pentest/exploits/set# ./set-update
U src/payloads/set_payloads/http_shell.py
U src/payloads/set_payloads/shell.py
U src/payloads/set_payloads/shell.windows
U src/payloads/set_payloads/set_http_server.py
U src/payloads/set_payloads/persistence.py
U src/payloads/set_payloads/listener.py
U src/qrcode/qrgenerator.py
U modules/ratte_module.py
U modules/ratte_only_module.py
U set-automate
U set-proxy
U set
U set-update
U readme/LICENSE
U readme/CHANGES
root@bt:/pentest/exploits/set#
Once you’ve updated to the latest version, start tweaking your attack by editing the
SET configuration file. Let’s walk through each of the flags:
root@bt:/pentest/exploits/set# nano config/set_config
# DEFINE THE PATH TO METASPLOIT HERE, FOR EXAMPLE
/pentest/exploits/framework3
METASPLOIT_PATH=/pentest/exploits/framework3
3
Looking through the configuration options, you can change specific fields to get a
desired result. In the first option, you can change the path of where the location of
Metasploit is. Metasploit is used for the payload creations, file format bugs, and for the
browser exploit sections
三、在SET工具包根目录下的config/core/set_config文件中配置
参考SET作者的David Kennedy编写的《Metasploit渗透测试指南》2017年第2版
四、 在/etc/setoolkit/set.config
对于Kali 2021.4a和Kali 2022.3,以上配置文件未发现,在/etc/setoolkit/中发现set.config文件可以配置