If
you installed metasploit from git repository then you donot face any
problem with SET. But If you have installed metasploit from its
binary version then when you tried to running social engineering
toolkit metasploit attack then might be you get error of some ruby
bundle. Here is solution of that problem. I tested on SET Version:
5.2.1 & metasploit v4.6.2-1.
We
are going to install Ruby 1.9.3 using RVM. Running all this command in msf3 folder
root@bt:~# cd /opt/metasploit/apps/pro/msf3/
root@bt:/opt/metasploit/apps/pro/msf3# bash -s stable < <(curl -s https://raw.github.com/wayneeseguin/rvm/master/binscripts/rvm-installer)
root@bt:/opt/metasploit/apps/pro/msf3#
source /etc/profile.d/rvm.sh
root@bt:/opt/metasploit/apps/pro/msf3#
rvm -v
Once
RVM is up and running we need to get a couple of libraries that will
be required by the Ruby installation:
root@bt:/opt/metasploit/apps/pro/msf3# for package in zlib openssl libxslt libxml2; do rvm pkg install
$package; done
And
finally the Ruby 1.9.3 runtime:
root@bt:/opt/metasploit/apps/pro/msf3#
rvm install 1.9.3
root@bt:/opt/metasploit/apps/pro/msf3#
rvm 1.9.3 --default
root@bt:/opt/metasploit/apps/pro/msf3#
ruby -v
root@bt:/opt/metasploit/apps/pro/msf3#
gem install bundler
root@bt:/opt/metasploit/apps/pro/msf3#
bundle install
Now
open set from its path ; before running set type command like below
cd
/pentest/exploits/set
source
/etc/profile.d/rvm.sh
rvm
1.9.3 –default
./se-toolkit
Now
you can use any metasploit attack from SET .
No comments:
Post a Comment