1 00:00:00,180 --> 00:00:01,140 Welcome back, everyone. 2 00:00:01,530 --> 00:00:09,960 We have completed the installation of Kaleem Machine Calendar next on Virtual Box will be installing 3 00:00:09,960 --> 00:00:12,380 Gally Machine on VM there. 4 00:00:12,780 --> 00:00:16,620 Now remember, there is a gain of virtualization software. 5 00:00:16,760 --> 00:00:27,150 OK, if you remember what we talked earlier, VMware is a way of segregating your your host machine, 6 00:00:27,510 --> 00:00:32,020 your this machine from your guest operating system. 7 00:00:32,040 --> 00:00:35,790 In our case, the guest operating system is your machine. 8 00:00:36,210 --> 00:00:44,730 And you know why it is important to have segregation or why it is important to virtualize both of them. 9 00:00:44,730 --> 00:00:51,720 Because it is need to it does need to have a separation so that whatever you do or here, it should 10 00:00:51,720 --> 00:00:53,040 not impact your machine. 11 00:00:53,620 --> 00:01:02,250 And as of now, you also know, just like the way you want your numbers, you need your find my you 12 00:01:02,250 --> 00:01:03,750 need your podcast's. 13 00:01:03,750 --> 00:01:08,460 You need all sorts of Mac applications on your MacBook. 14 00:01:08,670 --> 00:01:12,720 Or maybe you need paint, you need office applications. 15 00:01:13,050 --> 00:01:19,170 You need, you know, Microsoft each for browsing all the stuff for your Windows operating system. 16 00:01:19,440 --> 00:01:27,480 Exactly the same way there are a whole lot of hacking applications needed for Cal Machine, and that's 17 00:01:27,480 --> 00:01:29,990 the reason we are going for Kelly as well. 18 00:01:31,320 --> 00:01:34,530 This is not the only one, but this is the one will be starting. 19 00:01:34,530 --> 00:01:36,270 But there is one more call. 20 00:01:36,300 --> 00:01:38,520 Pareto's will be talking about it. 21 00:01:38,520 --> 00:01:44,550 And indeed some of the bonus lecture or maybe in the legislation is so much time. 22 00:01:44,550 --> 00:01:45,330 Let's get started. 23 00:01:46,530 --> 00:01:52,800 So for this will again go to the Kelly download. 24 00:01:54,000 --> 00:01:55,290 But this time. 25 00:01:57,750 --> 00:02:04,550 You may ask why I'm on the windows, just that I have my license on Windows. 26 00:02:04,610 --> 00:02:13,350 OK, so go down all the way to down and you find Kelly for Galilea 64. 27 00:02:13,350 --> 00:02:17,190 But for Veum there, you can simply click on it. 28 00:02:19,370 --> 00:02:30,340 It is taking the time it is, yeah, correct, and use again, see 64 or 32, but you can select 64, 29 00:02:30,350 --> 00:02:32,740 but let's get it downloaded. 30 00:02:33,920 --> 00:02:35,180 I already have one. 31 00:02:35,870 --> 00:02:36,850 I'm always ready. 32 00:02:39,200 --> 00:02:40,220 So you see this. 33 00:02:41,150 --> 00:02:45,410 You see the moment you get it downloaded, you can extract the file. 34 00:02:45,830 --> 00:02:49,810 You just need to show you the file format. 35 00:02:49,850 --> 00:02:53,700 This is your file that you have to open it. 36 00:02:54,350 --> 00:02:56,650 This is going to be a configuration file. 37 00:02:57,020 --> 00:02:58,530 And what you can do. 38 00:02:58,550 --> 00:02:59,910 You can simply double click it. 39 00:03:01,670 --> 00:03:02,230 Oh, sorry. 40 00:03:02,240 --> 00:03:09,340 This is not really the configuration file, really, but the configuration file is somewhere over here. 41 00:03:09,350 --> 00:03:09,560 Yeah. 42 00:03:09,890 --> 00:03:10,420 Over here. 43 00:03:10,850 --> 00:03:14,660 So you can click on the configuration file the moment you do that. 44 00:03:18,200 --> 00:03:24,530 Your your river systems automatically fetch the system and. 45 00:03:29,280 --> 00:03:33,570 Wait for a second, because it might take some time to load. 46 00:03:38,300 --> 00:03:39,320 Right, so. 47 00:03:45,130 --> 00:03:48,510 We'll try it again in case you're stuck with something. 48 00:03:50,700 --> 00:03:59,670 So we see the configuration file, and yet it is we just you just need to double click on it, you click 49 00:03:59,670 --> 00:04:09,300 on it and on the very you immediately get your the machine popped up, just powered it up. 50 00:04:09,660 --> 00:04:12,250 Click on the power on this virtual machine. 51 00:04:13,100 --> 00:04:15,600 Remember, this is your guest operating system. 52 00:04:16,360 --> 00:04:19,470 You can if you're not sure you can always opt for. 53 00:04:19,470 --> 00:04:20,220 I copied it. 54 00:04:20,640 --> 00:04:21,500 Just click on it. 55 00:04:21,890 --> 00:04:27,930 It is taking some time to do, you know, process the information. 56 00:04:28,350 --> 00:04:32,970 And once it is ready, you get the beautiful galley logo. 57 00:04:34,200 --> 00:04:41,730 You can just press enter and the default username and password is Kelly Kelly, which you can of course, 58 00:04:41,730 --> 00:04:44,250 change in whenever you want it. 59 00:04:44,350 --> 00:04:48,690 And it is always recommended to change it because it's a lab. 60 00:04:48,690 --> 00:04:49,710 So it's all up to you. 61 00:04:50,040 --> 00:04:50,330 All right. 62 00:04:50,730 --> 00:05:03,870 So you see this big building Gally logo and once said, get loaded, you get a pop up for username and 63 00:05:03,870 --> 00:05:04,530 password. 64 00:05:06,330 --> 00:05:07,340 All right, here we go. 65 00:05:19,800 --> 00:05:20,160 Right. 66 00:05:20,310 --> 00:05:24,810 So, Kelly, Kelly, lovely. 67 00:05:25,470 --> 00:05:29,050 So this is all about turning up the candy machine. 68 00:05:29,460 --> 00:05:40,410 This is just like what you do for installing your windows on your Dell or HP or any of your laptop or 69 00:05:40,890 --> 00:05:48,810 turning off your Macintosh, our latest Mac OS on your MacBook Pro or Makir and all the stuff. 70 00:05:49,140 --> 00:05:51,590 Or it could be open to a desktop as well. 71 00:05:51,960 --> 00:05:56,970 It's exactly the same way you get your lovely desktop experience. 72 00:05:57,360 --> 00:06:07,260 It just that in spite of having your productivity application, you get to see the hacking application 73 00:06:07,410 --> 00:06:15,270 here, starting from information gathering, vulnerability analysis, web application analysis, database 74 00:06:15,270 --> 00:06:17,490 assessment and all those stuff. 75 00:06:17,490 --> 00:06:18,600 Wireless attacks. 76 00:06:18,840 --> 00:06:21,810 This is we are going to cover one by one. 77 00:06:23,250 --> 00:06:28,080 Then there are polls, exploitation plus exploitation apps as well. 78 00:06:28,900 --> 00:06:30,630 Forensic apps do. 79 00:06:30,990 --> 00:06:36,750 And this is all bundled in a single operating system. 80 00:06:36,780 --> 00:06:41,790 This is made mainly for hacking the targeting system. 81 00:06:41,910 --> 00:06:42,360 All right. 82 00:06:42,660 --> 00:06:46,060 I hope you like this because I hope you like the session. 83 00:06:46,080 --> 00:06:47,160 We'll catch you in the next one. 84 00:06:47,190 --> 00:06:47,630 Thank you.