GNU nano 2.2.2 File: config/set_config
################################################## #################################
################################################## #################################
## __________________________________________________ ____________________________##
## The following config file will allow you to customize settings within________________________ ##
## the Social Engineer Toolkit. The lines that do not have comment code______________________ ##
## ("#") are the fields you want to toy with. They are pretty easy to ____________________________##
## understand. __________________________________________________ ___________________##
## __________________________________________________ _____________________________ ##
## The Metasploit path is the default path for where Metasploit is located._____________________ ##
## Metasploit is required for SET to function properly. _____________________________________ ##
## __________________________________________________ _____________________________ ##
## The ETTERCAP function specifies if you want to use ARP Cache poisoning in _________________##
## conjunction with the web attacks, note that ARP Cache poisoning is only ___________________##
## for internal subnets only and does not work against people on the internet. __________________ ##
## __________________________________________________ _____________________________##
## The SENDMAIL option allows you to spoof source IP addresses utilizing an __________________##
## application called SendMail. Sendmail is NOT installed by default on BackTrack5._____________##
## To spoof email addresses when performing the mass email attacks, you must________________##
## install Sendmail manually using: apt-get install sendmail_________________________________##
## __________________________________________________ _____________________________ ##
## Note that ETTERCAP and SENDMAIL flags only accept ON or OFF switches. _________________ ##
## __________________________________________________ _____________________________##
## Note that the Metasploit_PATH cannot have a / after the folder name._______________________ ##
## __________________________________________________ _____________________________##
## There are additional options, read the comments for additional descriptions. _________________##
## __________________________________________________ _____________________________##
################################################## ##################################
################################################## ##################################
#
# DEFINE THE PATH TO METASPLOIT HERE, FOR EXAMPLE /pentest/exploits/framework3
METASPLOIT_PATH=/opt/framework3/msf3
[ line 1/191 (0%), col 1/99 (1%), char 0/8948 (0%) ]
^G Get Help ^O WriteOut ^R Read File ^Y Prev Page ^K Cut Text ^C Cur Pos
^X Exit ^J Justify ^W Where Is ^V Next Page ^U UnCut Text ^T To Spell