O'Reilly logo

Metasploit Penetration Testing Cookbook by Abhinav Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Working with the SET config file

In this recipe, we will take a close look at the SET config file which contains default values for different parameters that are used by the toolkit. The default configuration works fine with most of the attacks, but there can be situations when you have to modify the settings according to the scenario and requirements. So let us see what configuration settings are available in the config file.

Getting ready

To launch the config file, move to config and open the set_config file.

root@bt:/pentest/exploits/set# nano config/set_config

The configuration file will be launched with some introductory statements, as shown in the following screenshot:

How to do it...

Let us see what configuration settings are available for ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required