1 00:00:00,270 --> 00:00:03,220 Welcome to part one of this module. 2 00:00:03,240 --> 00:00:09,120 This first video is going to be covering the basics of virtual private servers which have been mentioned 3 00:00:09,120 --> 00:00:11,960 many times over the course of this class. 4 00:00:12,270 --> 00:00:20,640 A virtual private server or CPS is a virtual machine sold as a service by an Internet hosting service. 5 00:00:20,640 --> 00:00:26,820 Another way to think about it is to say that a regular server is running several virtual systems at 6 00:00:26,820 --> 00:00:31,320 once and you're renting one of these for your own purposes. 7 00:00:31,320 --> 00:00:37,130 This tends to be a lot cheaper and less technically involved than running your own full blown server. 8 00:00:37,140 --> 00:00:44,250 But why would a penetration tester or even a black hat hacker choose to do this. 9 00:00:44,250 --> 00:00:50,940 Well the ability to have either a virtual server or a full server running at all times can be quite 10 00:00:50,940 --> 00:00:51,680 handy. 11 00:00:51,750 --> 00:00:58,980 And oftentimes these don't require a lot of power to black cats frequently use virtual private servers 12 00:00:58,980 --> 00:01:06,930 run by so-called bullet proof hosts as a command and control center for malware bought nets just as 13 00:01:06,930 --> 00:01:07,960 one example. 14 00:01:08,010 --> 00:01:13,490 Since the IP address that an infected computer connects to can be easily traced. 15 00:01:13,530 --> 00:01:20,280 This gives the black hat a degree of anonymity provided that there is no way to determine who is renting 16 00:01:20,340 --> 00:01:21,870 the service in question. 17 00:01:21,900 --> 00:01:28,860 When I use the phrase bullet proof hosting I am speaking of servers or virtual private servers in the 18 00:01:28,860 --> 00:01:37,710 case of this tutorial that are located in parts of the world that are shall we say unfriendly to inquiries 19 00:01:37,710 --> 00:01:40,910 from the penetration testers country of origin. 20 00:01:40,920 --> 00:01:49,230 In other words an American Black Hat might anonymously purchase a VPN in let's say Russia using some 21 00:01:49,230 --> 00:01:53,220 form of cryptocurrency or other anonymous payment method. 22 00:01:53,220 --> 00:01:59,100 It is unlikely that the Russian government will respond to demands to either shut the service down or 23 00:01:59,100 --> 00:02:04,450 share information about it provided that the blackout in question isn't using it against Russia. 24 00:02:04,500 --> 00:02:10,470 Now as lawful pen testers we need to be aware of this so that we can defend against it because this 25 00:02:10,470 --> 00:02:16,880 is the sort of tactic that is really going to allow attackers a lot of leeway in which to operate. 26 00:02:16,890 --> 00:02:24,060 Another scenario imagine that we purchase a VPN anonymously and then provision it with Cally or some 27 00:02:24,090 --> 00:02:26,400 other penetration testing distribution. 28 00:02:26,400 --> 00:02:33,120 Ideally you'd probably start with some base flavor of Linux and then build your own penetration testing 29 00:02:33,120 --> 00:02:39,200 operating system based on your particular needs installing tools as you require them. 30 00:02:39,330 --> 00:02:42,250 In this video we're going to see exactly that. 31 00:02:42,270 --> 00:02:47,750 We will be looking at a virtual private server which is running Cally Linux on it. 32 00:02:47,940 --> 00:02:54,450 Now obviously we won't be doing anything illegal here but a less ethical individual could set up such 33 00:02:54,450 --> 00:03:01,830 a VPN anonymously connect to it anonymously and then run attacks that originate from that remote server 34 00:03:02,100 --> 00:03:04,290 not their home computer. 35 00:03:04,320 --> 00:03:11,010 If the VPN does not keep logs and is quote unquote bullet proof and if the black head in question is 36 00:03:11,010 --> 00:03:17,220 connecting to it safely and anonymously at all times ideally from a connection not associated with their 37 00:03:17,220 --> 00:03:21,870 personal identity then attribution becomes almost impossible. 38 00:03:21,870 --> 00:03:24,960 All right enough preamble but before we begin. 39 00:03:24,960 --> 00:03:31,170 One very quick disclaimer I purchased the VPN ask that you are about to see used as a demonstration 40 00:03:31,410 --> 00:03:33,140 from a European provider. 41 00:03:33,150 --> 00:03:39,210 Now obviously I intend to use it only for legal and ethical reasons as I'm sure you will. 42 00:03:39,240 --> 00:03:45,020 Therefore ensuring that the provider was bullet proof was not a priority for this demonstration. 43 00:03:45,030 --> 00:03:50,220 I am not advocating the specific service that you're about to see one cloud hosting. 44 00:03:50,220 --> 00:03:57,060 It is adequate for the purposes of this class but whether or not it is the right choice for your privacy 45 00:03:57,060 --> 00:04:00,030 needs is something only to think long and hard about. 46 00:04:00,090 --> 00:04:05,490 There are a great many choices out there and some research on your part is going to be necessary. 47 00:04:05,490 --> 00:04:11,950 I will speak more on the subject of bullet proof hosting and how to find it a bit later for right now. 48 00:04:12,000 --> 00:04:17,340 Here we have the client web interface for the CPS itself. 49 00:04:17,340 --> 00:04:23,940 I have to say that every service out there has a slightly different console and some are a bit more 50 00:04:23,940 --> 00:04:25,500 straightforward than others. 51 00:04:25,500 --> 00:04:30,490 We can see here at the top of the screen the VPN Veep's host name. 52 00:04:30,570 --> 00:04:34,070 I chose to name mine tutorial dot Kali dot com. 53 00:04:34,080 --> 00:04:43,230 We have the IP address which will need to copy when it comes time to connect and we have the name servers 54 00:04:43,380 --> 00:04:47,370 a little later will walk through how to set all this up our operating system. 55 00:04:47,370 --> 00:04:53,940 In this case is Carly a flavor of Gnome or genome however you choose to pronounce it. 56 00:04:53,940 --> 00:05:00,840 The server is presently off line and we have basic power options such as powering off the G.P.S. restarting 57 00:05:00,840 --> 00:05:04,290 it from a powered on state and of course starting and stopping it. 58 00:05:04,290 --> 00:05:10,740 Now I do have to say that most providers do not offer Carly or another penetration testing distribution 59 00:05:11,070 --> 00:05:19,560 as an option but don't let that perturb you Debian is a very common choice and it is very easy to convert 60 00:05:19,660 --> 00:05:26,300 the base Debian into Cali in any number of ways as we'll see demonstrated a little later in this module. 61 00:05:26,310 --> 00:05:31,140 Most of these options that we are seeing are pretty self-explanatory and we can see that the server 62 00:05:31,140 --> 00:05:37,980 is currently off line and by the way I don't plan to keep the server so please don't experiment using 63 00:05:37,980 --> 00:05:42,930 the IP address as it will no longer be mine by the time you watch this video. 64 00:05:42,930 --> 00:05:47,520 All right now below we have our VPN management panel. 65 00:05:47,640 --> 00:05:53,040 As I said the look and feel of this panel is going to differ from service to service but the basics 66 00:05:53,100 --> 00:05:54,900 are generally the same. 67 00:05:54,900 --> 00:06:01,380 Some of these options as I said are self-explanatory like the change password option we can check logs 68 00:06:01,710 --> 00:06:07,610 and it is important to note that this particular service does in fact keep logs. 69 00:06:07,890 --> 00:06:14,790 We can schedule the G.P.S. to self shut down or any other tasks we want it to perform at particular 70 00:06:14,790 --> 00:06:15,560 times. 71 00:06:15,570 --> 00:06:21,210 We can also reinstall the operating system if we aren't happy with Carly usually to any other OS being 72 00:06:21,270 --> 00:06:27,550 offered by the service provider we can install applications into rescue mode if we run into trouble. 73 00:06:27,560 --> 00:06:27,910 OK. 74 00:06:27,930 --> 00:06:32,580 The options we are most concerned with here are our connection methods. 75 00:06:32,610 --> 00:06:38,460 We'll be using the most basic and straightforward for this demonstration and then is going to be no 76 00:06:38,460 --> 00:06:48,270 machine but we can SSA to write in or use a VPN see if we prefer no machine is free and we're going 77 00:06:48,270 --> 00:06:50,990 to need to download that so let's do that now. 78 00:06:52,660 --> 00:06:55,320 The download is going to be pretty straightforward. 79 00:06:55,420 --> 00:06:58,810 There's nothing special about the installation process. 80 00:06:58,840 --> 00:07:04,230 However you will want to make sure that no machine is white listed by your Windows firewall. 81 00:07:04,270 --> 00:07:10,570 If you're using Windows simply click download run the installer and follow the prompts. 82 00:07:10,570 --> 00:07:11,980 It's very straightforward. 83 00:07:12,010 --> 00:07:16,600 So the first thing we're going to do is we're going to turn on our server by clicking the play button 84 00:07:17,530 --> 00:07:22,310 again the interface may vary depending on your service and this may take a minute to load. 85 00:07:22,330 --> 00:07:28,360 Now you can just leave your server running all the time and I'm sure most of you will do that. 86 00:07:28,360 --> 00:07:31,890 It's not always a good idea okay. 87 00:07:31,900 --> 00:07:38,020 Here we are online and now we're gonna go ahead and we've installed no machine so we're going to launch 88 00:07:38,020 --> 00:07:38,290 it. 89 00:07:38,500 --> 00:07:40,630 No machine is pretty straightforward. 90 00:07:40,870 --> 00:07:45,630 These bottom two buttons allow you to toggle full screen mode for the moment. 91 00:07:45,640 --> 00:07:49,650 I'm going to leave it windowed click continue when you've made your selection. 92 00:07:49,780 --> 00:07:53,140 As you can see I already have a connection created. 93 00:07:53,140 --> 00:07:56,810 But if this is your first time you'll simply click new. 94 00:07:56,890 --> 00:08:03,650 Leave it on the annex protocol click continue for the host We're going to give it the IP address of 95 00:08:03,650 --> 00:08:06,950 our server which we copied from the panel. 96 00:08:07,010 --> 00:08:11,920 This usually is located on your control panel. 97 00:08:12,020 --> 00:08:21,440 Sometimes some services will send you the IP address only via your account acceptance email so you may 98 00:08:21,440 --> 00:08:23,190 have to look around for it a little bit. 99 00:08:23,210 --> 00:08:32,370 We'll leave the port as 4000 unless you set up a private key or use Kirby Ross select password and click 100 00:08:32,400 --> 00:08:33,060 continue. 101 00:08:33,060 --> 00:08:36,750 We also have the option of connecting via a proxy. 102 00:08:36,750 --> 00:08:39,620 In this case we're just going to select no proxy. 103 00:08:39,680 --> 00:08:42,360 Click continue and we can name our connection. 104 00:08:44,860 --> 00:08:46,960 You can name it whatever you wish. 105 00:08:46,960 --> 00:08:48,330 Click Done. 106 00:08:48,570 --> 00:08:52,250 Select the connection and question and click. 107 00:08:52,250 --> 00:08:57,530 Connect now we'll be prompted to provide our user name and password. 108 00:08:57,550 --> 00:09:02,870 Once you've done this supplied your credentials click the OK button. 109 00:09:02,920 --> 00:09:05,890 No machine is telling us about its screen settings. 110 00:09:05,890 --> 00:09:09,370 This is very much like virtual box. 111 00:09:09,580 --> 00:09:17,920 So if you are in full screen mode and you wish to access these buttons at any time you can use control 112 00:09:17,980 --> 00:09:25,510 alt 0 or you can go up to the right hand corner of the screen which should cause these little tab buttons 113 00:09:25,510 --> 00:09:26,440 to appear. 114 00:09:26,480 --> 00:09:29,910 Click OK and you can read through this if you want to. 115 00:09:29,920 --> 00:09:34,680 This is all pretty straightforward and not relevant to what we're doing right now. 116 00:09:34,930 --> 00:09:39,700 You have the option to leave the menu panel displayed as a window. 117 00:09:39,700 --> 00:09:41,250 I'm going to choose to do so. 118 00:09:41,320 --> 00:09:44,280 If you find it irritating you can turn it off. 119 00:09:44,380 --> 00:09:50,050 And finally no machine will usually resize your screen because I'm not in full screen mode. 120 00:09:50,050 --> 00:09:56,560 The aspect ratio here isn't going to be absolutely perfect you're going to see a few black bars. 121 00:09:56,560 --> 00:10:02,200 Now when you do choose full screen your virtual machines should automatically size to the no machine 122 00:10:02,200 --> 00:10:02,890 window. 123 00:10:02,890 --> 00:10:09,190 I do apologize for not doing that but it tends to slow things down quite a bit when I'm recording and 124 00:10:09,250 --> 00:10:13,230 it's not really necessary for interacting with your virtual private server. 125 00:10:13,240 --> 00:10:15,120 So when you're ready click OK. 126 00:10:15,190 --> 00:10:15,920 Pretty simple. 127 00:10:15,940 --> 00:10:17,210 And we're connected. 128 00:10:17,260 --> 00:10:21,350 This works exactly like virtual box Cally. 129 00:10:21,550 --> 00:10:26,280 We supply our user name which is going to be root in almost all cases. 130 00:10:26,590 --> 00:10:29,910 And for our password it would normally be Tor. 131 00:10:29,920 --> 00:10:36,370 But when we set up our our account will be asked to supply a password for the operating system. 132 00:10:36,370 --> 00:10:38,700 So go ahead and supply your password. 133 00:10:38,710 --> 00:10:45,750 Now it probably won't be tor unless you specifically set it up to be Tor and then click sign in. 134 00:10:45,790 --> 00:10:48,380 Once you've entered your password click sign in. 135 00:10:48,550 --> 00:10:52,700 And here we can see we're connected and I'm not going to update no machine right now. 136 00:10:52,750 --> 00:11:00,580 And the aspect ratio as I said will correct itself when you choose full screen mode so here we are. 137 00:11:00,580 --> 00:11:08,280 And this is basically Cally Linux exactly as it would be if you were running it inside a virtual environment 138 00:11:08,440 --> 00:11:10,620 and you are in fact running it in a virtual environment. 139 00:11:10,630 --> 00:11:12,330 It's just a remote one. 140 00:11:12,340 --> 00:11:15,080 So everything works exactly the same. 141 00:11:15,130 --> 00:11:17,230 We can open up our terminal. 142 00:11:17,530 --> 00:11:25,470 We can and should do act get updates and act get upgrade. 143 00:11:25,480 --> 00:11:32,470 But in most cases when you first install the operating system it will be fully updated and upgraded 144 00:11:32,470 --> 00:11:33,070 already. 145 00:11:33,940 --> 00:11:35,730 So that is something to keep in mind. 146 00:11:35,800 --> 00:11:40,310 And once updated the sky's the limit in terms of what you can do here. 147 00:11:40,450 --> 00:11:49,300 You could hypothetically speaking connect to this P.S. using proxy chains and Tor or a VPN then run 148 00:11:49,300 --> 00:11:56,620 proxy chains and Tor on this server to connect remotely and lawfully for penetration testing against 149 00:11:56,650 --> 00:12:04,840 yet another server you could upload the command and control server for a botnet and then bots on computers 150 00:12:04,840 --> 00:12:13,270 that you personally own can connect to it and you can interact with them assuming that that's legal 151 00:12:13,270 --> 00:12:19,720 in your particular area of the world you could store sensitive files that you do not want on your personal 152 00:12:19,720 --> 00:12:25,780 computer or even experiment with potentially dangerous virus programs just like you could in a regular 153 00:12:25,780 --> 00:12:30,550 old virtual box content to the knowledge that you can always reset the server. 154 00:12:30,610 --> 00:12:37,240 Now provided that the host is trustworthy and that proper operational security is maintained on your 155 00:12:37,240 --> 00:12:40,600 end the degree of anonymity here is extremely high. 156 00:12:40,630 --> 00:12:47,540 OK so we'll see a bit more possible uses and ways to connect to this a little later. 157 00:12:47,650 --> 00:12:50,440 But for right now how do we set it up. 158 00:12:50,770 --> 00:12:54,460 As you can see it was not hard to connect once we have a server. 159 00:12:54,460 --> 00:12:56,040 But how do we get a server. 160 00:12:56,140 --> 00:13:00,890 OK a disconnect from no machine. 161 00:13:00,970 --> 00:13:07,090 And I'm going to go ahead I'm going to shut down the server the PBS has been powered off and I'm going 162 00:13:07,090 --> 00:13:10,000 to go ahead and log out of the client area. 163 00:13:10,120 --> 00:13:20,920 OK I'm logged out so once again in the service that I'm using for this demonstration is one host cloud. 164 00:13:21,110 --> 00:13:27,590 I want to be really clear that I'm not advocating this particular service but I am going to walk through 165 00:13:27,590 --> 00:13:35,070 the process of signing up because signing up and setting up are really the same thing. 166 00:13:35,120 --> 00:13:41,750 It won't be exactly identical with another service but the overall thrust of it should be the same. 167 00:13:41,750 --> 00:13:48,380 A sign of a good CPS is that it will present you with a comprehensible method of setting up and connecting 168 00:13:48,380 --> 00:13:51,260 to it once the server is up and running. 169 00:13:51,260 --> 00:13:54,950 Usually it will give multiple methods if it doesn't. 170 00:13:54,980 --> 00:13:57,290 You may want to consider using a different one. 171 00:13:57,350 --> 00:14:05,330 So we're going to go to products in this case and this service offers Cally Linux CPS hosting back box 172 00:14:05,690 --> 00:14:09,200 parent security Tor hidden services. 173 00:14:09,260 --> 00:14:17,300 Most services will just be VPN hosting and then you would select from whatever selection of operating 174 00:14:17,300 --> 00:14:19,990 systems that they have available. 175 00:14:20,150 --> 00:14:27,350 In this case I'm going to click Cally we're going to scroll down to their pricing plan and we'll select 176 00:14:27,350 --> 00:14:28,710 an appropriate plan. 177 00:14:28,710 --> 00:14:34,280 Again every VPN is different but there are a couple of things you want to look at the 14 dollar a month 178 00:14:34,280 --> 00:14:34,760 plan. 179 00:14:34,760 --> 00:14:42,590 In this case gives us a server with one core two gigabytes of EDC memory 50 gigabytes of SSD storage 180 00:14:43,080 --> 00:14:45,640 a 100 megabit port. 181 00:14:45,650 --> 00:14:53,870 And it guarantees SS age and console access access no machine remote desktop and the cloud dashboard 182 00:14:53,900 --> 00:14:59,890 are going to be some services will offer them and some won't. 183 00:14:59,900 --> 00:15:01,600 So that's something to think about. 184 00:15:01,910 --> 00:15:06,740 Pretty much all VPN services should offer some kind of a dashboard. 185 00:15:07,010 --> 00:15:10,920 That is the page we saw a moment ago that allows you to control a server. 186 00:15:11,240 --> 00:15:15,410 Sadly not all such dashboards are created equal. 187 00:15:15,440 --> 00:15:21,320 And before you drop a lot of money on any service I recommend trying it on the cheap first and making 188 00:15:21,320 --> 00:15:23,480 sure it offers you what you need. 189 00:15:23,480 --> 00:15:28,430 Also pay close attention to what connection methods are actually supported. 190 00:15:28,430 --> 00:15:30,180 At what price point. 191 00:15:30,350 --> 00:15:36,290 Like I said some services do not offer no machine which may limit you to SSD age. 192 00:15:36,290 --> 00:15:39,970 Some even seem to lack comprehensible console access. 193 00:15:39,980 --> 00:15:45,830 So it really comes down to what service you're using the question of how much power you need is also 194 00:15:45,830 --> 00:15:46,720 up to you. 195 00:15:46,850 --> 00:15:52,760 Every service pretty much works this way in terms of cost where the cheaper you get the less Ram and 196 00:15:52,760 --> 00:15:54,970 the less storage you are afforded. 197 00:15:54,980 --> 00:15:57,110 It just depends on what you need. 198 00:15:57,140 --> 00:16:03,450 Hopefully you have some idea of what you want to do with your VPN before you purchase it. 199 00:16:03,450 --> 00:16:06,410 And once again there are different monthly offerings here. 200 00:16:06,440 --> 00:16:09,950 Notice that it says 500 hours per month. 201 00:16:10,010 --> 00:16:12,390 That is another thing you want to watch out for. 202 00:16:12,440 --> 00:16:16,390 Some providers offer unlimited runtime per month. 203 00:16:16,400 --> 00:16:18,680 Others will make you pay extra. 204 00:16:18,680 --> 00:16:25,650 This one makes you pay extra bandwidth may also be a consideration so once we've got our billing plans 205 00:16:25,650 --> 00:16:29,730 selected we'll need to give a host name. 206 00:16:29,730 --> 00:16:34,520 In this case I'm going to use demo DOT KELLY dot com. 207 00:16:34,560 --> 00:16:37,410 Yours can be anything you wish. 208 00:16:37,800 --> 00:16:45,410 The root password is going to be the root password for the Cally operating system. 209 00:16:45,450 --> 00:16:50,650 It is not your account password so please don't get those confused. 210 00:16:50,850 --> 00:16:55,200 In this case I'm just going to go with Tor I'm not really signing up but you'll want to go with something 211 00:16:55,200 --> 00:16:57,300 very secure for the name server. 212 00:16:57,300 --> 00:17:04,410 You can really put anything here and this one and as to that will suffice. 213 00:17:04,410 --> 00:17:08,700 This really only applies to normal VPN machines. 214 00:17:08,760 --> 00:17:19,030 You can also alter your DNS plan if you wish and below and the drag down menu we have the various operating 215 00:17:19,030 --> 00:17:21,300 systems that are being offered here. 216 00:17:21,460 --> 00:17:29,560 Now in this case this particular service separates pen testing CPS from regular ordinary run of the 217 00:17:29,560 --> 00:17:34,430 mill VPN is the service that you look at may not do that. 218 00:17:34,450 --> 00:17:39,970 Generally speaking you'll have a choice between various flavors of Linux. 219 00:17:39,970 --> 00:17:46,110 Sometimes a security oriented operating system will be offered usually not. 220 00:17:46,120 --> 00:17:53,450 I find that although Windows systems are available they tend to run a little bit more expensive. 221 00:17:53,500 --> 00:18:00,730 In other case we're being offered the choice of Cali X FC Cali no more genome. 222 00:18:00,790 --> 00:18:08,020 However you pronounce it blackbox and parents security genome is the version of Cali that we are most 223 00:18:08,020 --> 00:18:09,030 familiar with. 224 00:18:09,490 --> 00:18:18,130 Visually speaking it is worth pointing out that except C is slightly faster in terms of its overall 225 00:18:18,130 --> 00:18:20,320 performance with no machine. 226 00:18:20,320 --> 00:18:26,080 There is some latency when you use no machine and a few other connection methods. 227 00:18:26,080 --> 00:18:28,320 So this may be preferred. 228 00:18:28,540 --> 00:18:29,560 I prefer genome. 229 00:18:29,560 --> 00:18:32,010 This choice is not irrevocable. 230 00:18:32,050 --> 00:18:38,320 We can reinstall the operating system at any time although doing so will obviously wipe any data we 231 00:18:38,320 --> 00:18:39,730 have stored on the server. 232 00:18:39,730 --> 00:18:45,330 And finally we want to note the fact that this particular service does not come with unlimited hours. 233 00:18:45,340 --> 00:18:46,780 That costs extra. 234 00:18:47,230 --> 00:18:54,620 So if you want that you would simply click this when you've made your selections click Continue. 235 00:18:54,620 --> 00:18:59,350 Sometimes a VPN will offer a promo code for its longtime users. 236 00:18:59,360 --> 00:19:01,280 If you have one this is where you enter it. 237 00:19:02,590 --> 00:19:06,310 Click checkout and this is where you would enter your payment information. 238 00:19:06,310 --> 00:19:11,140 But if we scroll down here this is also where you enter your account information. 239 00:19:11,320 --> 00:19:19,900 And it is this password here that will allow you to log into your VPN server console through the client 240 00:19:19,900 --> 00:19:21,550 area of the web page. 241 00:19:21,550 --> 00:19:26,900 So it's important to keep both your passwords in mind and separate. 242 00:19:26,920 --> 00:19:33,580 Now again if anonymity is a consideration you're going to want to pay with cryptocurrency or some other 243 00:19:33,580 --> 00:19:36,280 safe method not with a credit card. 244 00:19:36,280 --> 00:19:39,610 Some services let you do this and some don't. 245 00:19:39,610 --> 00:19:41,440 Most do. 246 00:19:41,440 --> 00:19:45,070 This is another consideration when choosing a VPN yes. 247 00:19:45,160 --> 00:19:52,300 If you can pay with a gift card purchased with cash a cryptocurrency some other payment method great 248 00:19:53,080 --> 00:19:59,290 otherwise you might want to pass depending on your security and anonymity needs. 249 00:19:59,290 --> 00:20:00,850 Once you purchase a VPN. 250 00:20:00,850 --> 00:20:06,160 It may take some time for it to be provisioned depending on the service provider. 251 00:20:06,190 --> 00:20:09,110 Some providers are a little slower than others. 252 00:20:09,130 --> 00:20:12,720 Anything more than 48 hours is quite unreasonable. 253 00:20:12,760 --> 00:20:18,520 In general it should take only a few hours to get you up and running and that is about it in terms of 254 00:20:18,520 --> 00:20:22,400 the subscribing and setting up process for the server. 255 00:20:22,420 --> 00:20:28,120 As I said the exact process might be slightly different with another provider like for example digital 256 00:20:28,150 --> 00:20:29,080 ocean. 257 00:20:29,080 --> 00:20:33,030 But these are broad strokes of how it can be done. 258 00:20:33,070 --> 00:20:38,620 You'll almost always have a dashboard console of some kind that lets you control the server from a web 259 00:20:38,620 --> 00:20:40,920 browser and access your account. 260 00:20:41,110 --> 00:20:46,510 Only the options being offered tend to vary from service to service in the next video we'll look at 261 00:20:46,510 --> 00:20:49,930 more ways of interacting with our virtual private server. 262 00:20:49,960 --> 00:20:55,840 Some fun things we can do with it and we'll also talk about finding what I was calling bullet proof 263 00:20:55,840 --> 00:20:57,070 hosting. 264 00:20:57,190 --> 00:21:02,620 And as always please only use the information shown in these videos in a lawful manner. 265 00:21:02,620 --> 00:21:10,210 And remember that although we are looking at how black hats operate we do so from a perspective of defending 266 00:21:10,210 --> 00:21:15,640 against such mischief when it is employed against our own computers and servers. 267 00:21:15,640 --> 00:21:22,150 Please also be conscious not only of the law as it pertains to your country but also the laws of the 268 00:21:22,150 --> 00:21:26,460 countries where your VPN is located in this demonstration. 269 00:21:26,980 --> 00:21:33,460 I am based out of the United States subscribing to a company which is based out of the United Kingdom 270 00:21:33,970 --> 00:21:37,010 and the server itself is located in France. 271 00:21:37,030 --> 00:21:40,870 What is legal in one jurisdiction may not be illegal in another. 272 00:21:40,870 --> 00:21:47,650 So please be very careful when you experiment with a VPN to avoid breaking any laws accidentally. 273 00:21:47,650 --> 00:21:48,850 Thank you for your attention.