1 00:00:00,210 --> 00:00:06,540 Welcome to Section three in this section, we're going to cover how to set up your hacking lab so you 2 00:00:06,540 --> 00:00:09,750 can get started actually practicing your hacking. 3 00:00:09,750 --> 00:00:14,430 So some of the things that we're going to cover in this particular section is really going to allow 4 00:00:14,430 --> 00:00:21,990 you to get the understanding of how exactly we go about hacking into different systems, how exactly 5 00:00:21,990 --> 00:00:28,860 the black hats actually work when they're looking to gain access or to do something that is malicious. 6 00:00:28,860 --> 00:00:29,050 Right. 7 00:00:29,070 --> 00:00:30,560 Some sort of malicious attack. 8 00:00:30,570 --> 00:00:37,070 And so what we're always looking to do is step into the mindset of the black individual. 9 00:00:37,530 --> 00:00:38,670 How are they thinking? 10 00:00:38,670 --> 00:00:39,720 What are they perceiving? 11 00:00:39,720 --> 00:00:42,480 How are they going about their plan of attack? 12 00:00:42,480 --> 00:00:50,250 And so with us setting up a hacking lab, we're going to be able to step into exactly how a black hat 13 00:00:50,250 --> 00:00:56,520 individual would be looking to gain access or provide some type of attack on a network. 14 00:00:56,550 --> 00:00:58,520 So let's go right ahead and jump in here. 15 00:00:58,770 --> 00:01:04,230 So in Section three, just like I mentioned, what we're going to be doing here is learning how to set 16 00:01:04,230 --> 00:01:10,560 up our own hacking lab so that we can work through our desktop computer or laptop or whatever device 17 00:01:10,560 --> 00:01:11,160 that you have. 18 00:01:11,340 --> 00:01:16,500 Most likely you want to have some sort of laptop or some sort of desktop computer. 19 00:01:16,860 --> 00:01:22,080 You don't really want to set this up through like some type of mobile device or some sort of tablet. 20 00:01:22,290 --> 00:01:25,260 You want to make sure that you have an actual computer, right. 21 00:01:25,260 --> 00:01:28,540 Either desktop or laptop to work with this type of lab. 22 00:01:29,100 --> 00:01:34,410 So the first thing that we're going to be covering here is what exactly are virtual machines and what 23 00:01:34,410 --> 00:01:38,600 are the recommended hardware specs to run them on your actual machine? 24 00:01:39,030 --> 00:01:43,660 So virtual machines is something that we're going to dive in deep into. 25 00:01:44,100 --> 00:01:49,080 I want you to really get an understanding of how we're going to use them in our hacking lab and why 26 00:01:49,080 --> 00:01:54,330 they are so important and essential when we are actually doing our hacking. 27 00:01:54,750 --> 00:02:00,930 And then we're going to also learn how to download and install highly Linux into our virtual machine 28 00:02:00,930 --> 00:02:02,370 so we can use this for hacking. 29 00:02:02,580 --> 00:02:04,320 This is very, very important as well. 30 00:02:04,560 --> 00:02:11,010 Kaldi Linux is essentially a must for us when we're setting up our hacking lab so that we can do a lot 31 00:02:11,010 --> 00:02:12,150 of the different commands. 32 00:02:12,630 --> 00:02:17,640 We can get access to a bunch of different files and do a bunch of other stuff that we're going to walk 33 00:02:17,640 --> 00:02:19,080 through in this section. 34 00:02:19,230 --> 00:02:25,080 And then also you're going to learn how and where to download and install vulnerable virtual machines 35 00:02:25,080 --> 00:02:25,560 to hack. 36 00:02:25,770 --> 00:02:27,720 So we're going to walk through quite a bit here. 37 00:02:27,900 --> 00:02:32,580 And what I really want to get into now is what exactly is a hacking lab? 38 00:02:32,590 --> 00:02:38,610 So to give you an overview here at Hacking Lab is a network that you create that lets you practice your 39 00:02:38,610 --> 00:02:40,710 skills in a controlled environment. 40 00:02:40,890 --> 00:02:47,340 What you're really doing here is you looking to reduce the risk that actually come from actually hacking 41 00:02:47,640 --> 00:02:48,450 real systems. 42 00:02:48,450 --> 00:02:48,610 Right? 43 00:02:48,660 --> 00:02:49,540 Real networks. 44 00:02:49,560 --> 00:02:52,740 If you look at the image to the right, you see that there's an individual. 45 00:02:53,220 --> 00:02:54,570 He's practicing chemistry. 46 00:02:54,570 --> 00:02:57,560 He's in his lab working with different formulas and whatnot. 47 00:02:57,810 --> 00:02:59,700 That's exactly what we're going to be doing. 48 00:02:59,700 --> 00:03:00,020 Right. 49 00:03:00,060 --> 00:03:06,450 However, we're going to be using different programs, different scripting languages, CALEIGH, Linux. 50 00:03:06,450 --> 00:03:06,790 Right. 51 00:03:06,810 --> 00:03:10,530 And then different components and strategies within our hacking lab. 52 00:03:10,560 --> 00:03:16,350 So what essentially a virtual lab allows you to do is allows you to practice pretty much any time that 53 00:03:16,350 --> 00:03:18,210 you want 24/7. 54 00:03:18,360 --> 00:03:24,690 And you don't have to put your data in danger of getting wiped out or getting some sort of virus or 55 00:03:24,690 --> 00:03:25,620 malware infection. 56 00:03:25,620 --> 00:03:25,940 Right. 57 00:03:26,220 --> 00:03:30,000 Because that's one of the biggest things that you want to keep in mind when you're doing your hacking 58 00:03:30,270 --> 00:03:32,400 and you're looking to practice. 59 00:03:32,700 --> 00:03:33,030 Right. 60 00:03:33,030 --> 00:03:39,240 Stepping into the mind of the black hattar, you want to make sure that you're always protected in your 61 00:03:39,650 --> 00:03:41,160 information and identities. 62 00:03:41,160 --> 00:03:41,910 Always protected. 63 00:03:41,910 --> 00:03:42,200 Right. 64 00:03:42,360 --> 00:03:49,740 And so you're also saved from legal troubles that may result from testing on a real website that you 65 00:03:49,860 --> 00:03:51,270 don't perhaps do not own. 66 00:03:51,270 --> 00:03:53,490 And you may be a little bit curious. 67 00:03:53,490 --> 00:03:57,390 You may be stepping into the gray hat area where you're curious about something. 68 00:03:57,840 --> 00:04:02,880 I would recommend that you don't get into that type of area where, you know, even though you're not 69 00:04:02,880 --> 00:04:08,670 looking to cause any kind of malicious harm, that you just make sure you're staying on the white hat 70 00:04:08,670 --> 00:04:13,670 side of things so that you can remain protected and you're not crossing over any lines. 71 00:04:13,860 --> 00:04:20,160 And then also, obviously, you get the freedom to be able to experiment and tweak around within your 72 00:04:20,160 --> 00:04:21,180 own lab. 73 00:04:21,180 --> 00:04:21,410 Right. 74 00:04:21,420 --> 00:04:28,380 You don't have to worry about using somebody else's tools, somebody else's VPN or virtual private machines. 75 00:04:28,560 --> 00:04:32,460 Everything is going to be on your computer for you to be able to play with. 76 00:04:32,640 --> 00:04:38,790 And so when we're talking about virtual machines, virtual private networks, all these different things 77 00:04:38,790 --> 00:04:45,840 that have the virtual right in the very beginning and all these different types of mechanisms and systems 78 00:04:46,080 --> 00:04:49,690 that are, quote unquote virtual, what exactly this mean? 79 00:04:50,100 --> 00:04:54,540 Well, what this all really comes down to is the concept of virtualization. 80 00:04:54,690 --> 00:04:59,640 And according to VMware, which I believe there is one of the first companies that. 81 00:04:59,920 --> 00:05:07,580 Ali started the virtualization industry, and according to them, virtualization is a process of creating 82 00:05:07,580 --> 00:05:15,470 a software based or virtual representation of something such as a virtual application server storage 83 00:05:15,470 --> 00:05:16,400 and or networks. 84 00:05:16,400 --> 00:05:16,650 Right. 85 00:05:16,970 --> 00:05:19,850 Look at the right hand side here, this image. 86 00:05:20,300 --> 00:05:25,910 So what you have is you have a client, you have, let's say, a computer, and then you have, let's 87 00:05:25,910 --> 00:05:32,570 say a program, a virtual desktop like Kelly Linux or maybe some other type of application. 88 00:05:32,690 --> 00:05:34,670 And then you have servers. 89 00:05:34,880 --> 00:05:41,180 And so what this is allowing you to do, let's say you have one server and let's say you have 10 gigs. 90 00:05:41,330 --> 00:05:43,820 OK, this is just a simple example here. 91 00:05:44,110 --> 00:05:45,920 You got one server with 10 gigs. 92 00:05:46,130 --> 00:05:51,980 And typically, for the most part, without virtualization, you can only have one operating system 93 00:05:51,980 --> 00:05:57,860 on there, let's say Microsoft server or whatever kind of server software, maybe Linux or whatever 94 00:05:57,860 --> 00:06:00,100 that may be right on that one server. 95 00:06:00,260 --> 00:06:07,490 If you have virtualization, you can actually break down that 10 gig of space and break it down into, 96 00:06:07,490 --> 00:06:10,760 let's say, four different groups or three different groups. 97 00:06:10,760 --> 00:06:15,800 And let's say if you had three, you can break it down three point five, three point five and three 98 00:06:15,800 --> 00:06:16,490 point five. 99 00:06:16,490 --> 00:06:16,820 Right. 100 00:06:17,120 --> 00:06:24,530 As far as space, and then be able to install, let's say, Microsoft Enterprise, Microsoft server 101 00:06:24,680 --> 00:06:30,230 on one of the three point fives as far as the operating system and let's say on the other three point 102 00:06:30,230 --> 00:06:36,410 five gigs of space, you want to maybe install Linux and then on the other three point five gigs of 103 00:06:36,410 --> 00:06:41,270 space, maybe you want to install another software, maybe Microsoft Windows or whatever that may be. 104 00:06:41,270 --> 00:06:41,570 Right. 105 00:06:41,720 --> 00:06:43,480 I'm just trying to give you an example here. 106 00:06:43,490 --> 00:06:49,640 So what you've done with virtualization is instead of only being able to install, let's say, Linux 107 00:06:49,880 --> 00:06:57,350 and to that one 10 gig server, you're now able to have three different types of operating systems on 108 00:06:57,350 --> 00:07:00,370 that server through the power of virtualization. 109 00:07:00,380 --> 00:07:00,710 Right. 110 00:07:00,720 --> 00:07:08,120 So virtualization relies on software to simulate hardware functionality and create a virtual computer 111 00:07:08,120 --> 00:07:08,540 system. 112 00:07:08,540 --> 00:07:08,750 Right. 113 00:07:08,750 --> 00:07:14,960 Just like I mentioned, those three point five gigs of space are all broken down to simulate hardware 114 00:07:14,960 --> 00:07:15,740 functionality. 115 00:07:15,740 --> 00:07:21,470 And so you have three different operating systems on that one server through that virtualization. 116 00:07:21,470 --> 00:07:27,170 And just like I mentioned, this allows the ability to run more than one virtual system and multiple 117 00:07:27,200 --> 00:07:30,870 operating systems and applications on a single server. 118 00:07:30,890 --> 00:07:37,340 And so this is really something that a lot of organizations, a lot of companies out there use to increase 119 00:07:37,340 --> 00:07:43,370 their efficiency, increase their ability to use more of their systems storage and just greater overall 120 00:07:43,370 --> 00:07:44,340 functionality. 121 00:07:44,360 --> 00:07:51,680 And so for us, we're able to also utilize this to our advantage and have different types of virtual 122 00:07:51,680 --> 00:07:58,450 machines, you know, networks and machines on one device when in reality we only have one computer. 123 00:07:58,580 --> 00:08:04,520 However, within that computer or that laptop, whatever device we're using, we're able to go undetected 124 00:08:04,670 --> 00:08:10,100 and we're able to use several different operating systems and applications within that one. 125 00:08:10,100 --> 00:08:11,630 Machines are very, very powerful. 126 00:08:11,660 --> 00:08:17,840 I really wanted you to get an understanding here of what virtualization is and how important of a concept 127 00:08:17,840 --> 00:08:22,940 it is for you to understand as an ethical hacker in the next following lectures, Anthony is going to 128 00:08:22,940 --> 00:08:28,820 walk you through a little bit more in-depth explanation and overview of what exactly virtual machines 129 00:08:28,820 --> 00:08:34,790 are and how we're going to use them to our advantage in our hacking lab and then also how to install 130 00:08:34,790 --> 00:08:39,530 Caleigh Linux so you can get started working with your actual hacking lab. 131 00:08:39,540 --> 00:08:41,390 So that's going to be here for this one. 132 00:08:41,390 --> 00:08:42,740 And we'll see you on the next one.