1 00:00:00,360 --> 00:00:01,040 Welcome back. 2 00:00:02,080 --> 00:00:05,050 Have you managed to figure out the comment from previous video? 3 00:00:06,240 --> 00:00:11,670 Don't worry if you haven't since it was a tricky one, let us see what the solution is. 4 00:00:12,510 --> 00:00:19,200 So if we navigate to my folder, which we created in the previous video, we want to copy our file three 5 00:00:19,200 --> 00:00:24,500 to Be White, which is our pilot program from folder directory to the desktop directory. 6 00:00:25,260 --> 00:00:32,970 And if you try to solve it but didn't manage to, you probably went with command copy file three top 7 00:00:33,000 --> 00:00:34,500 white desktop. 8 00:00:36,290 --> 00:00:38,540 And if I press enter. 9 00:00:39,560 --> 00:00:46,850 This woman probably surprised you since it created another folder or pardon me, another file in the 10 00:00:46,850 --> 00:00:49,160 folder directory called Desktop. 11 00:00:50,090 --> 00:00:57,830 This is because it read our comment as if we wanted to copy our file into another file in the same directory 12 00:00:58,130 --> 00:00:59,610 and we call that file. 13 00:00:59,660 --> 00:01:00,160 That's the. 14 00:01:01,060 --> 00:01:07,780 And this is just how the command works in order to successfully copy the file to the subdirectory. 15 00:01:08,050 --> 00:01:14,620 We must run the command and specify the full path to the desktop, as well as the name of the copy that 16 00:01:14,620 --> 00:01:15,090 we want. 17 00:01:15,550 --> 00:01:17,650 So it would look something like this. 18 00:01:17,920 --> 00:01:21,580 First, we're going to delete this desktop file since we don't need it. 19 00:01:23,240 --> 00:01:31,480 And then you specify zip file three dot vi and we specify the full path to the desktop, which is slash 20 00:01:32,780 --> 00:01:38,490 slash Mr Packer and then best after it. 21 00:01:38,510 --> 00:01:44,120 We also want to specify slash and type here the name that we want our copy to have. 22 00:01:44,630 --> 00:01:49,010 So let's just call it our Cupitt dot be why we added up. 23 00:01:49,040 --> 00:01:55,410 Why since it is a python program, press enter and you will see right away on the desktop. 24 00:01:55,430 --> 00:01:57,760 We got our copy by. 25 00:01:59,100 --> 00:02:04,830 Now that we got that figured out, let us talk about the few network comments that we could use a lot 26 00:02:04,830 --> 00:02:05,790 throughout this course. 27 00:02:06,990 --> 00:02:14,040 The most important comment we already know is I have config we use I have config command to get our 28 00:02:14,040 --> 00:02:22,170 IP address and what the output of this command is, is all the network interfaces as well as IP addresses 29 00:02:22,320 --> 00:02:24,780 corresponding to those interfaces. 30 00:02:26,120 --> 00:02:27,680 If I run, I have config. 31 00:02:29,140 --> 00:02:37,510 Whoops, we get the comment not found, so we must run Shuto, I have config press enter, then we enter 32 00:02:37,510 --> 00:02:45,220 our password and here I have a few interfaces. 33 00:02:45,620 --> 00:02:51,130 So let me enlarge the terminal so we can see an argument that's just fully in longit. 34 00:02:51,220 --> 00:02:58,480 And from the comment once again and by the way, you can navigate to the previous commands using upper 35 00:02:58,480 --> 00:03:03,650 and lower error so I can navigate between all the comments that I ran previously. 36 00:03:03,880 --> 00:03:10,680 And here is pseudo, I have config and this is the output of my comment for you. 37 00:03:11,110 --> 00:03:13,090 This will probably be different. 38 00:03:14,170 --> 00:03:22,690 Here I have zero interface, which is my cable connection, and it has an IP address of one to that 39 00:03:22,690 --> 00:03:24,220 168, that one the 12. 40 00:03:25,860 --> 00:03:32,070 And I can also see the loop back interface, which is this L.O., which all of us should have, and 41 00:03:32,070 --> 00:03:40,880 it will be an IP address or one twenty seven 0.01 one, which is also a localhost IP for this cause. 42 00:03:40,920 --> 00:03:45,060 We will usually be interested in this IP address. 43 00:03:45,570 --> 00:03:49,490 If you have another interface called differently, that is also fine. 44 00:03:50,040 --> 00:03:54,800 You could have a different name interface if you, for example, are connecting over wi fi. 45 00:03:55,530 --> 00:04:04,380 This IP address that we get right here is called Local IP address, which means it only works inside 46 00:04:04,380 --> 00:04:09,930 of our network to communicate with other devices that are also inside of our network. 47 00:04:10,800 --> 00:04:15,720 There is also something called Public IP Address, which we are going to talk about later in the course. 48 00:04:16,080 --> 00:04:23,340 For now, just remember that I have Config Output's local IP address as well as our network interfaces. 49 00:04:24,470 --> 00:04:30,800 Another thing we can get from I config is our Mac address for a specific interface. 50 00:04:32,520 --> 00:04:43,140 So for the interface, here is my Mac address, and what Mac address is, is a unique identifier for 51 00:04:43,140 --> 00:04:43,950 every device. 52 00:04:44,430 --> 00:04:49,650 Unlike local IP addresses that could be the same in different networks, for example, it is a great 53 00:04:49,650 --> 00:04:56,280 possibility that you also have the IP address, starting with one to that 168 at one. 54 00:04:57,340 --> 00:05:03,070 While the Mac address is unique for every device in the world, and in case you are new to all of this 55 00:05:03,070 --> 00:05:08,710 and don't have much previous experience with MAC addresses and IP addresses, you might be asking, 56 00:05:08,980 --> 00:05:10,360 why do we need both of them? 57 00:05:10,960 --> 00:05:12,640 Well, let me explain this. 58 00:05:13,240 --> 00:05:19,720 Mac addresses are unique and usable in communications with your neighbor machines or simply with machines 59 00:05:19,720 --> 00:05:26,560 that are on your network while IP addresses are used to communicate over Internet and they can also 60 00:05:26,560 --> 00:05:27,040 change. 61 00:05:28,060 --> 00:05:35,440 Remember it like this Mac address tells you who you are, I.P. address tells you where you are. 62 00:05:36,510 --> 00:05:44,640 So that is the comment, and now that they think of this comment, there is one more important comment 63 00:05:44,640 --> 00:05:48,980 that I didn't show you and that you will use a lot, which is pseudo. 64 00:05:49,500 --> 00:05:50,940 Remember, we used it. 65 00:05:50,950 --> 00:05:51,930 We have config. 66 00:05:52,380 --> 00:05:55,200 Now, Sudo is not the part of the config command. 67 00:05:55,500 --> 00:06:01,200 It is just a command that we use once we want to execute something as a route user. 68 00:06:01,830 --> 00:06:05,540 And just to remind you, our road user is something like an administrator. 69 00:06:05,790 --> 00:06:09,450 It has has privileges above all other users. 70 00:06:10,350 --> 00:06:11,430 We trust user. 71 00:06:11,430 --> 00:06:13,770 You can execute any commands that you want. 72 00:06:14,580 --> 00:06:19,980 For example, once we ran this, I command it, told us command doesn't exist. 73 00:06:20,280 --> 00:06:22,770 If I just type once again, I have config. 74 00:06:22,920 --> 00:06:24,660 It will say command, not font. 75 00:06:25,910 --> 00:06:32,630 But after using pseudo config, we managed to execute it. 76 00:06:33,570 --> 00:06:39,210 That is because I have config command must be rent with food privileges in order for it to execute. 77 00:06:40,600 --> 00:06:46,210 Throughout this course, we will encounter many programs and many comments that will require pseudo 78 00:06:46,240 --> 00:06:53,390 in order to run, and sometimes there could be multiple commands at once that we must execute as a producer. 79 00:06:54,130 --> 00:06:59,410 There is one call trick so you don't have to type Suto before every command is to run at the beginning 80 00:06:59,500 --> 00:06:59,980 pseudo. 81 00:07:00,240 --> 00:07:07,720 And then as you press enter and if you're running smoothly for the first time inside of one terminal 82 00:07:07,720 --> 00:07:13,870 session, it will ask you for your password and then it will login into the fruit terminal. 83 00:07:15,020 --> 00:07:22,100 So everything you run from now on, you will run as a rule to count right now I no longer need to specify 84 00:07:22,100 --> 00:07:28,480 sudo I've config, I can just specify I have config and it will not tell me command not found it will 85 00:07:28,510 --> 00:07:29,240 executed. 86 00:07:29,240 --> 00:07:35,180 Since I am a road user, as it says right here, it is no longer Mr. Hacker, it is now route. 87 00:07:36,300 --> 00:07:43,110 If you want to exit out of this terminal, you simply just type exit and it'll go back to your Mr. Hacker 88 00:07:43,260 --> 00:07:43,710 terminal. 89 00:07:44,610 --> 00:07:47,400 Now, this can also be applied to files. 90 00:07:47,880 --> 00:07:50,970 Some files might be created only for you to count to edit. 91 00:07:51,420 --> 00:07:58,860 For example, if we run the command pseudo touch file one, we press enter. 92 00:07:59,850 --> 00:08:10,560 And if we, for example, type pseudo nano file one type here, hello there, we control to save and 93 00:08:10,560 --> 00:08:18,270 then control, exit to exit, we won't be able to edit this file as a normal user without comment or 94 00:08:18,270 --> 00:08:19,650 without DeGroote account. 95 00:08:20,680 --> 00:08:27,850 If I lower this terminal, here is our final one, and the reason why we can't edit it is because this 96 00:08:27,850 --> 00:08:32,680 actual file right now has been opened and edited with route privileges. 97 00:08:32,920 --> 00:08:35,370 And once we said it, we saved it is a route. 98 00:08:35,660 --> 00:08:43,720 So right now, if we try to narrow it, it will tell me file is on writable, which means I cannot write 99 00:08:43,720 --> 00:08:44,250 anything. 100 00:08:44,290 --> 00:08:45,520 Well, I mean, I can. 101 00:08:45,520 --> 00:08:50,010 But if we try to save it, it will tell me right here. 102 00:08:50,350 --> 00:08:51,640 Permission denied. 103 00:08:52,890 --> 00:08:56,250 So let's close this and open terminal once again. 104 00:08:57,220 --> 00:09:06,450 However, if we go as a route to count to the file one and we type our password now we can type and 105 00:09:06,450 --> 00:09:07,110 I think we want. 106 00:09:08,780 --> 00:09:14,030 Just one second, it seems that we opened the wrong file, this is the file, one that we created from 107 00:09:14,030 --> 00:09:16,280 the previous video that says today's a really good day. 108 00:09:16,610 --> 00:09:22,850 And to go to the file, one that would account created, I believe it is one directory back 109 00:09:25,640 --> 00:09:35,300 or let's just go to the pseudo user type enter, said Mr. Hacker, said desktop CAD file one. 110 00:09:37,230 --> 00:09:42,330 Never mind, since we can't really find it, let's just create another file, just make sure you go 111 00:09:42,330 --> 00:09:51,840 to the fruit account of the terminal and then type NENO test file and once you type nano test file here 112 00:09:51,840 --> 00:09:52,230 type. 113 00:09:52,380 --> 00:09:53,480 Hello there. 114 00:09:54,030 --> 00:10:00,210 Save this exit account and the failover terminal right now. 115 00:10:00,480 --> 00:10:06,820 We will see this test file right here on our desktop, but it also has this lock right here. 116 00:10:07,170 --> 00:10:11,760 This means we as a normal user cannot edit this file. 117 00:10:13,010 --> 00:10:18,530 We first need to go to death to the rectory, so let's go to the Mr. Hacker and then desktop and we 118 00:10:18,530 --> 00:10:24,710 NENO test file, it will tell us once again, file is on writable. 119 00:10:26,490 --> 00:10:32,630 Only Ruth account can edit it, and this is something you will encounter a lot, so it is really important 120 00:10:33,000 --> 00:10:39,930 next time you see either something like command not found or right protected file or this requires road 121 00:10:39,930 --> 00:10:43,530 privileges, just know that it needs to be run with pseudo. 122 00:10:44,560 --> 00:10:50,710 All right, so with this, we finished our small crash course for Lennix, and I would advise you to 123 00:10:50,710 --> 00:10:56,830 practice a little bit with the comments we learned and also explore Linux operating system a little 124 00:10:56,830 --> 00:11:03,970 bit, go to different directories, see what it all has, but be careful not to delete some important 125 00:11:03,970 --> 00:11:04,420 files. 126 00:11:05,490 --> 00:11:12,690 OK, now we are ready to finally go into the process of penetration testing, hopefully you are excited 127 00:11:12,690 --> 00:11:19,110 since this is where the fun starts, let us see how to perform the first phase, which is information 128 00:11:19,350 --> 00:11:19,890 gathering. 129 00:11:20,580 --> 00:11:21,150 See you there.