View Issue Details

IDProjectCategoryView StatusLast Update
0000358Kali LinuxKali Package Bugpublic2025-07-14 09:36
ReporterAjuk Assigned Todookie  
PrioritynormalSeveritymajorReproducibilityalways
Status closedResolutionno change required 
Platformx64OSKaliOS Version1.0
Summary0000358: SETs Wireless Access Point Attack Vector returns an empty file at /etc/default/dhcp3-server
Description

According to Social Engineer Toolkit:

[-] For this attack to work properly, we must edit the dhcp3-server file to include our wireless interface.
[!] If you receive an empty file in nano, please check the path of your dhcp3-server file!

File is empty

Steps To Reproduce

-Run SET
-Choose 1) Social-Engineering Attacks
-Choose 8) Wireless Access Point Attack Vector

Activities

dookie

dookie

2013-10-07 12:06

reporter   ~0000961

If you're still having this issue, please report it to the author's bug tracker:

https://github.com/trustedsec/social-engineer-toolkit/issues

Issue History

Date Modified Username Field Change
2013-05-18 20:28 Ajuk New Issue
2013-10-07 12:06 dookie Note Added: 0000961
2013-10-07 12:06 dookie Status new => closed
2013-10-07 12:06 dookie Assigned To => dookie
2013-10-07 12:06 dookie Resolution open => no change required
2025-07-14 09:36 g0tmi1k Priority high => normal