1 00:00:00,060 --> 00:00:01,240 So welcome back, everyone. 2 00:00:02,160 --> 00:00:10,140 This is the session where we are going to learn about how our lab is going to look like, and this is 3 00:00:10,140 --> 00:00:14,330 where all the all the real stuff would look like. 4 00:00:14,350 --> 00:00:21,270 OK, so our lab will consist of many tools, many, many softwares. 5 00:00:21,750 --> 00:00:29,850 But as a part of the code component, as a part of the core machines, we'll be talking about why a 6 00:00:29,940 --> 00:00:30,960 system in a way. 7 00:00:31,020 --> 00:00:32,590 OK, so let's get started. 8 00:00:32,910 --> 00:00:41,240 The first element, which is the backbone of the entire ethical hacking, is the Câline Linux. 9 00:00:41,850 --> 00:00:50,280 This is the the way you any for any any home user Windows or Mac is their backbone. 10 00:00:50,400 --> 00:00:54,900 That's where that's where the access the wall from. 11 00:00:54,900 --> 00:00:55,190 Right. 12 00:00:55,680 --> 00:01:03,510 Exactly the same way Calin Index is the operating system, the the analytical hacker axis, the world 13 00:01:03,900 --> 00:01:13,010 from OC and Galili is, is an operating system which will be continuously using it across our activity. 14 00:01:13,410 --> 00:01:16,410 That is the next is our victim as well. 15 00:01:17,550 --> 00:01:23,790 As we have discussed in the initial letters, our victim could be of the application will be targeting 16 00:01:23,800 --> 00:01:30,700 Web application, Iot devices, cloud even Wi-Fi network and applying machine like Windows as well. 17 00:01:31,110 --> 00:01:33,350 So we will be having a Windows 10 machine. 18 00:01:34,230 --> 00:01:34,980 You got me right. 19 00:01:34,990 --> 00:01:42,300 We won't be discussing any outdated operating systems like Windows seven or Windows XP and all those 20 00:01:42,300 --> 00:01:42,600 stuff. 21 00:01:42,600 --> 00:01:42,810 Right. 22 00:01:43,020 --> 00:01:49,380 As I promise you will be learning to hack all the latest technology. 23 00:01:49,380 --> 00:01:53,810 And that's why I will be attacking will be compromising Windows 10. 24 00:01:54,090 --> 00:01:58,530 OK, and I'll tell you personally how how will go step by step. 25 00:01:59,760 --> 00:02:06,330 Then we'll be understanding about compromising Web applications as well. 26 00:02:06,570 --> 00:02:13,230 And this is this would be an infected, already infected machines that would be already infected, set 27 00:02:13,230 --> 00:02:14,280 off Web applications. 28 00:02:14,850 --> 00:02:20,100 And this is made by a WASP broken web applications. 29 00:02:20,280 --> 00:02:27,900 So overlaps, just to give you a brief of ASP is basically a nonprofit organization that works continuously 30 00:02:28,260 --> 00:02:30,510 to secure the software globally. 31 00:02:30,660 --> 00:02:31,040 All right. 32 00:02:31,350 --> 00:02:33,800 And there are IP addresses. 33 00:02:33,810 --> 00:02:37,200 So this is just for your reference so that you can make a note of it. 34 00:02:37,200 --> 00:02:41,970 Whenever you come across those IP address, you quickly get the idea, OK, this is what I'm really 35 00:02:41,970 --> 00:02:42,520 talking about. 36 00:02:42,540 --> 00:02:46,890 So our machine will be having a different IP address for different machines. 37 00:02:47,310 --> 00:02:52,830 So our Kelly will have 10 node zero one one seven five. 38 00:02:53,100 --> 00:02:57,780 Our Windows machine, that's our victim will be having one, not one of five. 39 00:02:58,320 --> 00:03:06,390 Our OS Broken Web application infected machine will be having one one five has the IP address. 40 00:03:06,870 --> 00:03:09,800 Now the fourth lab would be our Windows servers. 41 00:03:10,620 --> 00:03:12,450 Of course, you might have heard about it. 42 00:03:12,720 --> 00:03:18,490 And this is where we'll be having our domain controller and our server as well. 43 00:03:18,510 --> 00:03:24,240 We'll be talking more in detail about what are those what domain controllers are basically doing and 44 00:03:24,240 --> 00:03:25,530 what DNS servers are. 45 00:03:25,860 --> 00:03:31,590 So just to give you a brief domain controller, makes it makes the database of all the users in the 46 00:03:31,590 --> 00:03:32,220 organization. 47 00:03:32,220 --> 00:03:38,310 It basically used by the enterprises to make and make a database of all the users and their privileges 48 00:03:38,610 --> 00:03:44,970 so that they can maintain the access control to their assets, so that they can assure who can access 49 00:03:44,970 --> 00:03:47,820 what resources in their organizations. 50 00:03:48,120 --> 00:03:56,730 And DNS server is basically a service into Windows servers that ensures the name to IP address mapping 51 00:03:57,000 --> 00:04:04,680 so that whenever you hit any names or any domain name or any website in your organization or anywhere 52 00:04:04,680 --> 00:04:09,660 in the world and the machine get the IP address against it. 53 00:04:09,660 --> 00:04:10,860 And why does it need that? 54 00:04:11,100 --> 00:04:17,100 Because your it's the name is for humans, but the machine works on the IP address. 55 00:04:17,380 --> 00:04:20,070 That's why it is important to have a mapping. 56 00:04:20,490 --> 00:04:24,980 But one single entity, and that's the DNS server, or we call it name server. 57 00:04:25,260 --> 00:04:30,090 So whenever you want to reach out to outside of the world, your machine reach out to DNS server. 58 00:04:30,090 --> 00:04:32,890 From there it gets the IP address and reach out to the Internet. 59 00:04:33,240 --> 00:04:34,200 That's just a brief. 60 00:04:34,860 --> 00:04:41,490 And then will be will be having one more component, one more machine as well, where we'll be having 61 00:04:41,490 --> 00:04:42,660 a Ubuntu server. 62 00:04:43,290 --> 00:04:49,290 Of course you might might be knowing about it as a part of Linux distribution and on the Ubuntu server 63 00:04:49,290 --> 00:04:50,910 will be running our database. 64 00:04:51,180 --> 00:04:59,010 And this is this won't be infected, but we'll be making use of it to run multiple databases that tables 65 00:04:59,340 --> 00:04:59,770 entry. 66 00:04:59,860 --> 00:05:05,560 Is in the database and will try to compromise those databases as well, and we'll get to see how different 67 00:05:05,560 --> 00:05:10,740 attacks like sexual education and many other forms of it really works out. 68 00:05:11,140 --> 00:05:18,820 And this would be really helpful to get the understanding about how the real world database exploitation 69 00:05:18,820 --> 00:05:26,650 or a injection or hacking of user information or data breaches really works and their corresponding 70 00:05:26,650 --> 00:05:35,560 IP addresses would be tendered or one dot one twenty five and 10 or 10, not zero one one three five 71 00:05:35,560 --> 00:05:35,970 as well. 72 00:05:37,020 --> 00:05:43,680 All right, so this is all about the lab, and I hope you made a note of it and we'll get you in the 73 00:05:43,680 --> 00:05:44,160 next one. 74 00:05:44,340 --> 00:05:44,790 Thank you.