WEBVTT

00:00.180 --> 00:00.470
Okay.

00:00.480 --> 00:02.580
Now it's time to prepare the environment.

00:02.610 --> 00:06.450
The first thing we want to download and install virtual box.

00:06.450 --> 00:07.620
So from Google.

00:07.650 --> 00:09.330
Download VirtualBox.

00:09.720 --> 00:12.070
Go to the download and from here.

00:12.090 --> 00:15.380
Choose the version you want regarding the platform you want.

00:15.390 --> 00:20.910
So Windows host OS X for Mac, Linux Distribution, Solaris and so on.

00:20.940 --> 00:25.320
In my case I am using Ubuntu, so I will choose a linux distribution.

00:26.590 --> 00:28.120
And I would have open to.

00:29.060 --> 00:30.560
20, which is this one.

00:31.520 --> 00:37.700
And then after you install it, just follow the instruction, as you can see from here and you can just

00:37.700 --> 00:38.990
install it as simple as that.

00:39.020 --> 00:44.980
The same thing for OS X the mac on the Mac and the same thing for Windows OC.

00:45.140 --> 00:46.580
Now this is the first thing.

00:46.610 --> 00:50.120
Now the second thing we want clearly Linux OC.

00:50.150 --> 00:58.190
Now by the way, we can install and map for Windows or for Mac or for Ubuntu by the way.

00:58.700 --> 01:08.480
But actually for you as a hacker, it's better to have Linux because Linux is an operating system used

01:08.480 --> 01:10.910
for penetration testers and it can hackers.

01:11.390 --> 01:15.000
So yeah, it is better to have Linux installed.

01:15.020 --> 01:21.860
So from here you can go to the Linux download and from here I want to choose a lifeboat, just this

01:21.860 --> 01:22.280
one.

01:22.280 --> 01:29.690
And here you can download it which is 3.7 gigabytes, which is Linux 2021 OC or torrent torrent.

01:29.690 --> 01:36.320
And you have the sum just in case to make sure that you have the right distribution or the right ISO

01:36.320 --> 01:38.000
file OC.

01:39.040 --> 01:44.080
Now the second thing or the third thing, actually not the second we want to have.

01:44.810 --> 01:47.540
An environment to test the map on.

01:47.540 --> 01:52.190
So we want to scan the board, the host vulnerability and so on.

01:52.190 --> 02:00.890
So actually it's better to have a local machine or a testing machine for that purpose, not to test

02:00.890 --> 02:04.520
on a live targets like Google, Dotcom or Amazon or whatever.

02:04.550 --> 02:05.960
No, actually, this is bad.

02:06.260 --> 02:08.410
So we will have Metasploit.

02:09.920 --> 02:15.260
So from here Metasploit table, you can download it from SourceForge or you can have it from Rabbit

02:15.260 --> 02:16.520
seven, which is this one.

02:17.450 --> 02:17.940
Okay.

02:18.350 --> 02:24.080
But of course you need to provide information, name, email the company are working with.

02:24.110 --> 02:26.900
You can put arbitrary values by the way OC.

02:27.670 --> 02:31.030
So you don't need to register and all of that.

02:31.720 --> 02:35.920
Now, after VirtualBox is downloaded and installed.

02:36.710 --> 02:40.700
Now we want to have clinics operating system.

02:40.730 --> 02:43.820
Now, you may ask me, but why we need clinics?

02:43.820 --> 02:47.780
Because by default it has the map already there.

02:48.440 --> 02:55.100
And by the way, again, we are as an ethical hackers, we have to learn the right way, which is using

02:55.100 --> 03:01.250
a clinics, because this is used mainly by, if you can, hackers or hackers generally.

03:01.940 --> 03:07.940
So from here up in the virtual box new and let's name it Kelly or Kelly Linux.

03:09.170 --> 03:15.350
And here you can choose Linux and its choose other 64 OC and you can choose next.

03:15.530 --> 03:17.630
Put it as much as you want.

03:17.840 --> 03:26.780
By the way, 512 megabyte will be enough, but in my case I have a lot of ram on my laptop so I can

03:26.780 --> 03:27.830
put to a no problem.

03:28.400 --> 03:31.610
And here you can create a hard disk.

03:31.640 --> 03:32.690
Next, next, next.

03:32.690 --> 03:37.190
I in my case, I will put it as 50 gigabyte or no.

03:37.190 --> 03:39.830
Actually, it's better to have it as 20.

03:39.860 --> 03:44.150
Now depends on your hardware again, because I have a lot.

03:45.380 --> 03:45.910
Okay.

03:46.310 --> 03:47.430
Now, this is the first thing.

03:47.450 --> 03:49.520
Now here, let's go to the sitting.

03:50.090 --> 03:56.690
While I'm choosing Kelly Lennox, let's go to the network, make sure it is a bridge adapter and make

03:56.690 --> 03:58.400
sure you are using the adapter.

03:58.400 --> 03:59.410
Do you want?

03:59.420 --> 04:02.630
In my case, this is the wi fi, not the Ethernet.

04:03.170 --> 04:05.710
And then go to the storage.

04:05.720 --> 04:13.280
So here choose the empty and choose the disk file and choose Kelly Linux OC which is this one and press.

04:13.280 --> 04:13.850
Okay.

04:14.480 --> 04:17.510
Now after this is done, let's click on Start.

04:21.170 --> 04:27.980
And as you can see, it will select we want to select the Kallenius 2021, which is this one.

04:30.640 --> 04:31.510
Let's start.

04:34.630 --> 04:38.680
And here in my case, I want I can put life.

04:39.440 --> 04:44.210
You can just run it as life or you can just start the installer, which is this one.

04:45.770 --> 04:47.000
I would choose English.

04:47.030 --> 04:47.810
Continue.

04:47.990 --> 04:49.280
United State.

04:49.550 --> 04:50.480
Continue.

04:50.720 --> 04:52.040
Now for the hostname.

04:52.040 --> 04:53.780
Choose, carry or whatever you want.

04:53.810 --> 04:54.430
Domain name.

04:54.440 --> 04:55.550
Leave it as empty.

04:57.770 --> 05:02.780
The full name for the new user because by default, Kari doesn't support the route by default.

05:03.260 --> 05:05.370
So you need to put a user here.

05:05.390 --> 05:08.000
So in my case, I can put Kelly.

05:11.160 --> 05:12.870
Username for your account.

05:12.870 --> 05:14.430
Kelly It will be.

05:15.510 --> 05:17.150
And it will be Kelly.

05:17.990 --> 05:20.060
Kelly one, two, three, four, five, six.

05:20.090 --> 05:21.230
Now, I know it's simple.

05:21.230 --> 05:24.050
Just this is for the sake of discourse.

05:24.900 --> 05:25.460
Okay.

05:26.580 --> 05:27.930
This is the best word.

05:29.980 --> 05:33.580
By the way, you need to provide a secure password.

05:33.610 --> 05:36.940
This is just arbitrary password for the SEC for this course.

05:38.420 --> 05:39.020
Okay.

05:39.410 --> 05:47.420
Now if you got stuck on the configure the network but make sure that you have the network from here,

05:47.420 --> 05:48.370
from the sitting.

05:48.590 --> 05:49.980
Let's turn it back to the net.

05:50.000 --> 05:54.440
Then after it is done, you can return it back to the bridge.

05:54.470 --> 05:56.660
Now why we need the bridge, not the net.

05:56.660 --> 05:59.390
Because we want to be on the same network.

06:00.740 --> 06:09.290
So the Linux will be will have an IP address on the same network of the Metasploit machine, which is

06:09.290 --> 06:12.170
that we want to use for testing.

06:13.070 --> 06:14.960
Don't worry, we will handle that right away.

06:15.590 --> 06:16.220
Continue.

06:16.250 --> 06:17.030
Continue.

06:17.860 --> 06:22.120
And you can choose either separate or all funds in one.

06:22.390 --> 06:23.760
Now, in our case, we don't.

06:24.100 --> 06:24.650
It doesn't matter.

06:24.670 --> 06:25.570
So continue.

06:26.440 --> 06:27.290
And finish.

06:27.310 --> 06:28.510
Just and.

06:28.510 --> 06:29.710
Yes, Quentin.

06:30.890 --> 06:31.180
Okay.

06:31.190 --> 06:32.150
Now you will see.

06:32.150 --> 06:33.070
You see this?

06:33.080 --> 06:34.820
Use a network mirror and choose.

06:34.820 --> 06:35.120
Yes.

06:35.120 --> 06:36.980
Continue, continue.

06:37.250 --> 06:38.510
Now you will see that.

06:38.510 --> 06:39.840
Install the drop bootloader.

06:39.860 --> 06:40.610
Yes.

06:41.500 --> 06:48.220
And you can choose this device, which is the main device, which is our main device.

06:48.220 --> 06:48.910
Continue.

06:50.910 --> 06:52.800
Now the installation is complete.

06:52.830 --> 06:55.380
Now let's select the first one.

06:55.560 --> 06:58.380
Here's what the user that we created previously.

06:58.410 --> 06:59.040
Kelly.

06:59.760 --> 07:00.570
And the password is.

07:00.570 --> 07:00.900
Kelly.

07:00.900 --> 07:02.340
One, two, three, four, five, six.

07:03.590 --> 07:05.630
Now we have the Kleenex is ready.

07:05.630 --> 07:08.480
So from here, let's go to the full screen.

07:09.510 --> 07:09.870
Yeah.

07:09.870 --> 07:10.920
I think this is better.

07:11.640 --> 07:13.830
And from here, if I click on it.

07:14.620 --> 07:20.730
So here if I type I f config, you can see that this is the IP address which is inside the net network.

07:20.740 --> 07:23.680
So from here, from the machine sitting.

07:25.670 --> 07:29.960
To the network and select bridge a data place OC.

07:30.260 --> 07:36.320
If I type a f config again, you will notice that it is still the same problem.

07:36.560 --> 07:39.230
So for for that I have config.

07:40.460 --> 07:43.370
Down to the F zero.

07:45.110 --> 07:48.740
Or actually it's at zero down.

07:49.860 --> 07:52.380
And of course, you need a pseudo permission.

07:52.380 --> 07:53.400
So to do this.

07:53.640 --> 07:56.100
And Kerry one, two, three, four, five, six.

07:56.940 --> 08:00.750
So you can notice that if I type I have config again.

08:01.680 --> 08:04.470
For this, you can see that the network is down.

08:05.520 --> 08:07.340
So you'll notice that here.

08:07.350 --> 08:11.700
So again a pseudo I have config.

08:11.740 --> 08:13.980
I actually I think I must yeah.

08:13.980 --> 08:15.960
I think it's better to increase the font size.

08:15.960 --> 08:20.430
So sudo I have config at zero up like that.

08:20.880 --> 08:23.520
So so do I have config.

08:23.550 --> 08:30.480
You can see that now we have the IP address which is this one which is inside the network and this is

08:30.480 --> 08:31.290
what we want.

08:31.290 --> 08:34.350
By the way, you can see that end map is here, right?

08:34.470 --> 08:36.450
As you can see and map is here.

08:36.870 --> 08:44.580
And by the way, if you don't like the opacity like this, just from here, from the file, the preferences

08:44.580 --> 08:51.510
from the cat here, from here, from the application, transparency, but to zero and apply.

08:51.720 --> 08:55.950
You can see that now there are no transparency at all and you can change.

08:56.670 --> 08:58.590
And by the way, you can change the.

08:59.960 --> 09:04.670
So from here, green on black, if you like this.

09:04.670 --> 09:07.910
Actually, I prefer this because it is.

09:07.910 --> 09:09.980
It's not just like I am talking.

09:09.980 --> 09:11.090
I am hack or something.

09:11.100 --> 09:11.690
No, no.

09:12.440 --> 09:13.670
The field like that.

09:13.670 --> 09:15.650
No, actually it is better for your life.

09:15.680 --> 09:16.850
Or at least for my eyes.

09:16.850 --> 09:17.870
I think this is better.

09:18.790 --> 09:20.200
Comfortable for my life.

09:20.810 --> 09:22.600
Okay, now the next step.

09:22.600 --> 09:25.960
We want to prepare the environment.

09:25.990 --> 09:31.480
We want to download and install the Metasploit table, or we already download it.

09:31.480 --> 09:36.460
So we want to install it so we can test and map against it in the next lectures.

09:36.760 --> 09:37.330
Okay.

09:37.630 --> 09:43.060
Now, after we prepare the Kali Linux, we want to prepare the Metasploit, which is the machine that

09:43.060 --> 09:45.230
we want to run the map against.

09:45.250 --> 09:52.210
To test what scans vulnerability, discovery and and all of that.

09:52.480 --> 10:00.010
So from the Metasploit, we actually downloaded the valuable tool, which is you already downloaded.

10:00.190 --> 10:03.910
Now from here, new name, anything.

10:03.940 --> 10:07.440
So let's name it meta exploit or Metasploit Build.

10:08.760 --> 10:09.210
Who?

10:10.450 --> 10:13.960
And choose Linux TOS other Linux 64.

10:15.170 --> 10:17.260
512 megabytes will be enough.

10:18.070 --> 10:19.060
Be it next.

10:19.060 --> 10:19.510
Next?

10:19.540 --> 10:20.920
Yes, it is enough.

10:20.920 --> 10:22.630
Or more than enough, actually.

10:23.080 --> 10:25.940
Now, click on the setting for this machine.

10:25.960 --> 10:29.920
Make sure it is a bridge adapter and from the storage here.

10:30.040 --> 10:34.660
So actually, we want to remove this and we add we want to add a new hard disk.

10:34.660 --> 10:36.940
So from here added add.

10:37.360 --> 10:38.360
So let's choose it.

10:38.380 --> 10:38.740
Yeah.

10:38.740 --> 10:40.540
The VMD k fine.

10:40.720 --> 10:43.270
Here, choose it and click choose.

10:43.600 --> 10:47.440
So you can see that we only have this one and the empty.

10:47.440 --> 10:50.740
So we have this one and as a primary device zero click.

10:50.740 --> 10:51.340
Okay.

10:51.580 --> 10:53.800
And just started as simple as that.

10:56.640 --> 11:02.040
Now after it is booted, we can see that it is only c a lie command line or a terminal and it will be

11:02.040 --> 11:03.780
asked for a log in.

11:03.780 --> 11:05.640
Username and password, by the way.

11:06.270 --> 11:11.220
You can find them on the same rapid7, which is the RMS f admin, which is this one.

11:11.460 --> 11:21.780
So if I go here MSF admin and again MSF admin, you can see that now we are log then as MSF admin and

11:21.780 --> 11:24.960
if you type I have config, you can see that.

11:24.960 --> 11:26.880
Yeah, we are inside the same network.

11:27.730 --> 11:29.110
Which is what we want.

11:29.140 --> 11:32.210
Now, here, the environment is ready.

11:32.230 --> 11:34.180
Now we have the virtual box inside it.

11:34.180 --> 11:41.410
We have Kali Linux, the attacking machine or the the machine that has a map that we want to run, the

11:41.410 --> 11:43.060
scanning techniques and all of that.

11:43.060 --> 11:45.340
We will handle it right away in the next lectures.

11:45.340 --> 11:53.890
And we have the test machine or the fact machines that we want to run and map against it to test scan,

11:53.890 --> 11:56.950
check the vulnerability or discovery and all of that.

11:57.040 --> 12:04.870
So you will not run that on a live machines or or live targets, which is bad practice or bad thing.

12:04.870 --> 12:06.160
You may get in trouble.

12:06.880 --> 12:07.320
Okay.

12:08.400 --> 12:09.180
Thanks for watching.

12:09.180 --> 12:10.550
I will see you in the next lecture.

12:10.560 --> 12:13.620
We will start handling the map scanning.
