View Issue Details

IDProjectCategoryView StatusLast Update
0001435Kali LinuxGeneral Bugpublic2025-07-14 09:17
ReporterDeeprunk Assigned Tomuts  
PrioritynormalSeveritymajorReproducibilityalways
Status closedResolutionno change required 
Platformx86OSKaliOS Version1.0.7
Product Version1.0.7 
Summary0001435: setoolkit not working correctly
Description

Hello guys, I'm having trouble fixing the setoolkit. By default it comes with version 6.0.0 in kali 1.0.7, and I upgraded to 6.0.4 by git hub and still does not help .. not run properly.

The problem is that after I put local ip, comes the part to clone the site. then lay just right and give ENTER. then he has to wait so I could log on and capture the traffic .. but it does not happen, what happens is that it comes this message:

[] Cloning the website: https://login.meusiteproprio.com/login.php[] This could take a little bit...

this is problem

"
The best way to use this attack is if username and password form
fields are available. Regardless, this captures all POSTs on a website.

[] Apache is set to ON - everything will be placed in your web root directory of apache.
[
] Files will be written out to the root directory of apache.
[*] ALL files are within your Apache directory since you specified it to ON.
Apache webserver is set to ON. Copying over PHP file to the website.
Please note that all output from the harvester will be found under apache_dir/harvester_date.txt
Feel free to customize post.php in the /var/www directory

[*] All files have been copied to /var/www
{Press return to continue} "

ps: my apache its runing

Steps To Reproduce

Select from the menu:

1) Social-Engineering Attacks
2) Fast-Track Penetration Testing
3) Third Party Modules
4) Update the Social-Engineer Toolkit
5) Update SET configuration
6) Help, Credits, and About

99) Exit the Social-Engineer Toolkit

set> 1

Select from the menu:

1) Spear-Phishing Attack Vectors
2) Website Attack Vectors
3) Infectious Media Generator
4) Create a Payload and Listener
5) Mass Mailer Attack
6) Arduino-Based Attack Vector
7) Wireless Access Point Attack Vector
8) QRCode Generator Attack Vector
9) Powershell Attack Vectors
10) Third Party Modules

99) Return back to the main menu.

set> 2

1) Java Applet Attack Method
2) Metasploit Browser Exploit Method
3) Credential Harvester Attack Method
4) Tabnabbing Attack Method
5) Web Jacking Attack Method
6) Multi-Attack Web Method
7) Full Screen Attack Method

99) Return to Main Menu

set:webattack>3

1) Web Templates
2) Site Cloner
3) Custom Import

99) Return to Webattack Menu

set:webattack>2

[-] Credential harvester will allow you to utilize the clone capabilities within SET
[-] to harvest credentials or parameters from a website as well as place them into a report
[-] This option is used for what IP the server will POST to.
[-] If you're using an external IP, use your external IP for this
set:webattack> IP address for the POST back in Harvester/Tabnabbing: xxx.xxx.x.x

[-] SET supports both HTTP and HTTPS
[-] Example: http://www.thisisafakesite.com
set:webattack> Enter the url to clone:http://www.mywebsite.com.br

=========

[] Cloning the website: https://login.facebook.com/login.php
[
] This could take a little bit...

The best way to use this attack is if username and password form
fields are available. Regardless, this captures all POSTs on a website.
[] Apache is set to ON - everything will be placed in your web root directory of apache.
[
] Files will be written out to the root directory of apache.
[] ALL files are within your Apache directory since you specified it to ON.
Apache webserver is set to ON. Copying over PHP file to the website.
Please note that all output from the harvester will be found under apache_dir/harvester_date.txt
Feel free to customize post.php in the /var/www directory
[
] All files have been copied to /var/www
{Press return to continue}

Activities

muts

muts

2014-07-23 23:43

reporter   ~0002361

Specific tool bugs should be reported to their respective developers.

Issue History

Date Modified Username Field Change
2014-06-24 21:06 Deeprunk New Issue
2014-06-29 19:52 vichet Issue cloned: 0001456
2014-07-23 23:43 muts Note Added: 0002361
2014-07-23 23:43 muts Status new => closed
2014-07-23 23:43 muts Assigned To => muts
2014-07-23 23:43 muts Resolution open => no change required
2025-07-14 09:17 g0tmi1k Priority urgent => normal