1 00:00:01,800 --> 00:00:09,370 In this lecture I will explain about how to download install configure and explore the MIT exploit. 2 00:00:09,370 --> 00:00:20,590 Well VM saw in the links shown here we can use one of these links to download the meta sprite value 3 00:00:20,610 --> 00:00:30,060 to the M and then import it into the tool box and the M is built from the ground up with large amounts 4 00:00:30,120 --> 00:00:32,130 of security vulnerabilities. 5 00:00:32,310 --> 00:00:39,520 It is intended to be used as a target for testing exploits with exploit. 6 00:00:39,540 --> 00:00:41,700 So how do we see that. 7 00:00:41,730 --> 00:00:54,990 I have already downloaded the meta sprite well VM in the format that contains the hard disk of the VM 8 00:00:55,080 --> 00:01:03,810 indeed VM decay format and I have already extracted these virtual hard disk into some folder on my windows 9 00:01:03,810 --> 00:01:06,090 machine. 10 00:01:06,090 --> 00:01:16,700 So here in virtual box I will create a new virtual machine with the name of meta exploitable with the 11 00:01:17,450 --> 00:01:22,780 type of Linux version of I want to. 12 00:01:23,420 --> 00:01:32,690 Then I would go next and I will set their arm to be four gigabytes and then I click on next and I will 13 00:01:32,690 --> 00:01:41,790 use an existing hard disk which is this one that I have extracted from the download. 14 00:01:41,810 --> 00:01:46,140 So now I would click on open the gate. 15 00:01:46,870 --> 00:01:55,320 Now ingeniously I will import these machine. 16 00:01:55,500 --> 00:02:02,940 So I would click on you and then disputable and then finish. 17 00:02:02,940 --> 00:02:12,430 And also I will add what the Kelly UNIX machine. 18 00:02:12,870 --> 00:02:22,210 Now I will drag both two machines to the ministry city workspace 19 00:02:27,870 --> 00:02:31,680 and I will start them 20 00:02:37,610 --> 00:02:43,640 and then connect them to the if which 21 00:02:48,330 --> 00:02:50,970 now I will configure. 22 00:02:51,030 --> 00:03:02,540 I read that is for both PMs so for the just 12:00 p.m. I have to enter the credentials for the log in 23 00:03:02,600 --> 00:03:13,960 which is MSF admin with the same password and then I would say the I brothers for 24 00:03:17,350 --> 00:03:31,390 you submit your defense to be wanted to do it one sixty eight not one but three in the nick mosque of 25 00:03:31,850 --> 00:03:33,710 slash 24. 26 00:03:38,640 --> 00:03:40,020 So here and Kelly Linux. 27 00:03:40,020 --> 00:03:54,070 I will configure my brothers so so do high if config what either you to interface the IP address of 28 00:03:55,570 --> 00:04:10,010 1 to 4 on the net mask of slash 24 and then I will try to test connectivity with the heat exploitable 29 00:04:10,800 --> 00:04:13,830 the amps or the one to three I address. 30 00:04:13,870 --> 00:04:18,930 So here we see that we have replies coming so we have connectivity. 31 00:04:19,180 --> 00:04:31,000 So let us try and access the delay to publication on the meta selectable VM so you wonder under 3 I 32 00:04:31,010 --> 00:04:34,380 bet it is ending delay day. 33 00:04:34,440 --> 00:04:41,860 So how we see the utility web application which is a free open source potentially very well with application 34 00:04:41,850 --> 00:04:42,940 that we can use for. 35 00:04:42,960 --> 00:04:52,080 We've been testing it is developed by the OS or what been web application security project organization 36 00:04:52,410 --> 00:04:59,720 which over many resources to help developers secure their applications and to identify attacks the US 37 00:04:59,840 --> 00:05:05,390 publishes a report every three years that detail the top 10 most widely exploited web application but 38 00:05:05,430 --> 00:05:07,280 abilities during that period. 39 00:05:08,360 --> 00:05:15,570 So here we see the link for these top 10 abilities that we can use for testing in our laps. 40 00:05:16,460 --> 00:05:24,560 So in this picture I have explained about how to download and install configure and explore the beta 41 00:05:24,580 --> 00:05:25,640 followed by VM.