1 00:00:00,620 --> 00:00:05,540 Hi, everyone, welcome to this first section and the section we are going to learn about how to set 2 00:00:05,540 --> 00:00:09,800 up your own informants so that you can practice your hacking attacks into them. 3 00:00:10,070 --> 00:00:13,500 So ethical hacking is a skill that is learned over time. 4 00:00:14,000 --> 00:00:18,770 It requires practice, patience to get to a decent level in this field. 5 00:00:19,190 --> 00:00:22,940 Having a lab setup handy can help you a lot in your learning. 6 00:00:23,630 --> 00:00:29,900 So a lab lets you practice a skill in a controlled environment, reducing the risk that arises from 7 00:00:29,900 --> 00:00:31,640 practicing on real system. 8 00:00:31,940 --> 00:00:36,540 So having your virtual lab will help you in many ways, like you can practice anytime. 9 00:00:36,560 --> 00:00:42,530 As for your convenience, you don't have to put your data under the danger of getting fired because 10 00:00:42,530 --> 00:00:43,700 of malware infection. 11 00:00:43,910 --> 00:00:50,630 And you're also see from the legal trouble that may result from testing on a real website that you do 12 00:00:50,630 --> 00:00:51,340 not own. 13 00:00:51,590 --> 00:00:55,280 So you can get the freedom to experiment and tweak around. 14 00:00:55,400 --> 00:00:58,930 So, guys, this is why setting up your lab is very important. 15 00:00:59,360 --> 00:01:02,060 So there are some requirements for setting your own lab. 16 00:01:02,450 --> 00:01:05,000 So the records will be like hardware software requirements. 17 00:01:05,000 --> 00:01:10,490 So the harder requirements are like a laptop, a desktop with as much ram and processor power you can 18 00:01:10,490 --> 00:01:17,630 arrange and a large as Dudi or ESAs to store your tools in other important files and one host operating 19 00:01:17,630 --> 00:01:22,940 system for a computer system so it can be Windows, Linux or MapQuest depending upon your choice. 20 00:01:23,180 --> 00:01:29,460 And when one very important thing, WiFi adapter that supports Motoman, because when it comes to network 21 00:01:29,510 --> 00:01:35,120 hacking on network pantries and testing, it is very, very important to have more intimate enabled 22 00:01:35,150 --> 00:01:36,220 WiFi adapter. 23 00:01:36,710 --> 00:01:38,390 So what are the software requirements? 24 00:01:38,510 --> 00:01:41,090 So software requirements is like virtual machine player. 25 00:01:41,570 --> 00:01:46,820 So this will be used to host all the guest operating systems when they build virtual machines and test 26 00:01:46,820 --> 00:01:47,360 servers. 27 00:01:47,720 --> 00:01:52,670 So there are many free and paid options for hypervisor as provided by many vendors. 28 00:01:52,680 --> 00:01:59,480 For example, VMware has VMware workstation, Oracle has Oracle Virtual Xbox and Microsoft has Hypernova. 29 00:01:59,900 --> 00:02:03,620 So you can choose any of these depending on your choice and budget. 30 00:02:03,650 --> 00:02:09,380 So in this particular case, we are going to use free virtual machine player, which is Oracle Virtual 31 00:02:09,380 --> 00:02:10,630 Box Sunaj. 32 00:02:10,640 --> 00:02:14,690 Second thing that we need in software requirements, guest operating system. 33 00:02:14,690 --> 00:02:19,280 So this operating system will include unpassed version of Windows and Linux. 34 00:02:19,790 --> 00:02:26,150 So these will be installed to test for Xeloda and other winnability for which patches as well as exploits 35 00:02:26,150 --> 00:02:26,990 have been released. 36 00:02:27,800 --> 00:02:31,660 And the next thing that we need here is one able virtual machines. 37 00:02:31,660 --> 00:02:36,320 So whenever virtual machines are developed intentionally for being highly visible. 38 00:02:36,530 --> 00:02:40,910 So most of the victims are part of hacking events and released later online. 39 00:02:41,030 --> 00:02:47,750 So these we are actually see the idea of capture the flag with hiddenness string that are to be found 40 00:02:47,750 --> 00:02:51,800 after compromising the so some popular will enable virtual machines. 41 00:02:51,800 --> 00:02:58,570 Are mutex played always BW a bit Bluey and Padstow be Isarn morality. 42 00:02:58,640 --> 00:03:02,270 So guys, this is what you need in software requirements. 43 00:03:02,270 --> 00:03:07,790 So if you talk about tools, so we are going to use Caledonius, which is already having hundreds of 44 00:03:07,790 --> 00:03:08,600 tools for use. 45 00:03:08,600 --> 00:03:11,030 So don't need to download install any Tulear. 46 00:03:11,210 --> 00:03:16,120 If there is need, then I will teach you how to download and how to use those tools. 47 00:03:16,250 --> 00:03:21,830 So guys, this is why setting up your involvement is very important when it comes to learning ethical 48 00:03:21,830 --> 00:03:27,120 hacking so that you can practice all the tags in your system without getting caught. 49 00:03:27,140 --> 00:03:31,040 So, guys, this is all for this lecture from the next lecture on which we are going to learn how to 50 00:03:31,040 --> 00:03:37,310 download virtual machine, how to download calendar next, and how to install colonics inside the virtual 51 00:03:37,310 --> 00:03:40,760 machine and how to download one Knebel virtual machines. 52 00:03:41,090 --> 00:03:42,430 So this is all for this lecture.