WEBVTT

0
00:01.260 --> 00:08.430
In this lecture we'll discuss the hacking lab environment. In this course we'll be using Linux as the

1
00:08.430 --> 00:12.410
hacking and penetration testing operating system.

2
00:12.540 --> 00:15.380
I suppose you use Windows or Mac, 

3
00:15.390 --> 00:23.730
as your main OS , and in this case you have to install Linux in a VM, in VirtualBox or VMWare. I'll

4
00:23.730 --> 00:26.330
show you how to do it in the next lecture.

5
00:27.300 --> 00:34.130
There are hundreds of Linux distributions available and I'm sure you wonder what could distro you should

6
00:34.130 --> 00:42.530
install. Even though the Security Concepts and hacking labs do not depend on a specific Linux distribution

7
00:42.890 --> 00:45.140
and you can run them on any linux

8
00:45.140 --> 00:52.660
my advice is to install Kali Linux and eventually if your  system resources permit it a second

9
00:52.700 --> 00:57.500
distribution like Ubuntu or Linux Mint in another VM.

10
00:57.500 --> 01:02.250
There are some hacking labs that require two Linux systems.

11
01:02.270 --> 01:04.600
These are also the distros

12
01:04.640 --> 01:07.450
I have used in a course.

13
01:07.570 --> 01:15.840
Let's see what Kali Linux is. Kali Linux is the world's most popular Offensive Security optimized

14
01:15.850 --> 01:20.060
Linux distribution. Based on Debian testing

15
01:20.160 --> 01:29.160
Kali includes more than 600 penetration testing tools including the big ones like Metasploit and Nmap and

16
01:29.250 --> 01:39.950
Aircrack-NG but also a wide variety of more obscure and specialized tools. You'll find tens of hacking

17
01:39.950 --> 01:49.040
tools used for information gathering, vulnerability analyses, wireless attacks, web application assessment,

18
01:49.280 --> 01:54.310
exploitation, stress testing or forensics tools.

19
01:54.320 --> 02:03.670
Moreover Kali is free and always will be. So the advantage of using Kali is that you don't have to

20
02:03.670 --> 02:11.430
set anything up all the needed tools are already installed configured and ready to be launched.

21
02:11.500 --> 02:19.810
Of course, if for any reason you prefer to use another distribution, you can do it. Just that you have

22
02:19.810 --> 02:26.980
to install and configure the security applications you want to use and sometimes is not the easiest

23
02:26.980 --> 02:27.430
job.

24
02:28.680 --> 02:35.820
Note that Cali is a Linux distribution specifically geared towards professional penetration testers

25
02:36.120 --> 02:41.280
and security specialists. Given its unique nature

26
02:41.280 --> 02:48.330
it is not recommended distribution if you are unfamiliar with Linux at all or if you are looking

27
02:48.330 --> 02:57.450
for a general purpose Linux desktop distribution for development, web design, gaming and so on. For those

28
02:57.540 --> 02:58.640
activities

29
02:58.760 --> 03:03.120
a distribution like Ubuntu or Linux Mint would be more appropriate.

30
03:04.650 --> 03:07.660
Another cybersecurity Linux distribution

31
03:07.710 --> 03:15.850
I want you to be aware of is Parrot OS. It's secure, lightweight free and portable.

32
03:15.960 --> 03:17.480
It could be more appropriate

33
03:17.550 --> 03:27.770
then Kali for older systems because it uses less resources. Like Kali, Parrot OS is is based on

34
03:27.770 --> 03:32.640
Debian and designed with security and privacy in mind.

35
03:32.780 --> 03:40.730
It includes a full portable laboratory for all kinds of cybersecurity operations from penetration testing

36
03:40.760 --> 03:44.090
to digital forensics and reverse engineering.

37
03:44.090 --> 03:51.260
But it also includes everything needed to develop your own software or keep your data secure.

38
03:51.350 --> 04:00.960
The graphical interface of Parrot OS is built using Ubuntu mate. You can install both Kali and Parrot

39
04:00.990 --> 04:09.240
OS in a VM and take a look at each of them because they're the two most popular operating systems used

40
04:09.270 --> 04:11.820
by most of the security professionals.