1 00:00:06,340 --> 00:00:06,600 OK, 2 00:00:09,780 --> 00:00:16,650 so the last lecture we set up our domain controller and now we're going to configure this, let's log 3 00:00:16,650 --> 00:00:24,030 in the first time to our shiny new DC and we'll wait for the server manager to pop up. 4 00:00:24,840 --> 00:00:28,210 This will give us the ability to install the DNS roll. 5 00:00:28,650 --> 00:00:35,280 This is where we're going to add forward lookups for all of the names and IP that are going to be in 6 00:00:35,280 --> 00:00:38,120 our separate structures and see what I mean. 7 00:00:38,910 --> 00:00:39,960 So to close this out. 8 00:00:40,760 --> 00:00:41,070 All right. 9 00:00:41,100 --> 00:00:43,030 So we're going to maximize this. 10 00:00:44,040 --> 00:00:45,090 We're going to click on DNS. 11 00:00:45,360 --> 00:00:48,480 DNS was installed with Active Directory, so we don't need to install it. 12 00:00:48,990 --> 00:00:49,470 And we could just. 13 00:00:49,470 --> 00:00:49,620 Right. 14 00:00:49,650 --> 00:00:52,210 Click on a server name and use DNS manager. 15 00:00:52,600 --> 00:00:54,510 OK, now here we've got our top level domain. 16 00:00:54,760 --> 00:00:55,400 Very cool. 17 00:00:56,010 --> 00:01:00,720 And if we look at the forward look Uptown's these are the E records. 18 00:01:00,720 --> 00:01:06,240 So we have the IP for addresses that match up to the names right here. 19 00:01:07,450 --> 00:01:12,040 And we're just going to add a few names in here, because we need to build out our lab, right? 20 00:01:12,050 --> 00:01:15,040 So we're going to say new host record and where we need. 21 00:01:17,040 --> 00:01:21,990 Well, we're going to have Splunk, so we're going to put that Splunk, that carbon bike, that local 22 00:01:22,170 --> 00:01:25,620 10, 100, zero, dark 90. 23 00:01:30,250 --> 00:01:36,640 Cool, that's been added, will add one for open since that's going to be our firewall and our router 24 00:01:36,640 --> 00:01:43,750 is going to have our Surakarta rules there open since 10, 100 zero one. 25 00:01:46,700 --> 00:01:47,570 And that host. 26 00:01:51,180 --> 00:01:58,650 And then we want our vulnerable Web app, so that'll be the Juice OAuth Juice app and that'll be at 27 00:01:59,190 --> 00:02:01,680 28 10:00 dot one hundred ninety one. 29 00:02:04,240 --> 00:02:06,040 I believe that's all we're going to need for now. 30 00:02:07,180 --> 00:02:11,090 So we'll click done what this is going to do, it's going to make it easy for us, right? 31 00:02:11,110 --> 00:02:16,540 So from our domain joined Windows 10 clients will be able to just type Jooste Carbon Buycott local, 32 00:02:16,930 --> 00:02:23,430 and it will load up our our vulnerable Web app instead of having to type in the IP address 10 100 091 33 00:02:24,010 --> 00:02:27,760 or if we want to go to Spot, we'll be able to type Splunk, that Kadenbach, that local instead of 34 00:02:27,760 --> 00:02:29,800 having to type in 10 100 zero. 35 00:02:29,800 --> 00:02:33,670 090 Ladin's is really nice and I think that's all we need to do here. 36 00:02:34,720 --> 00:02:37,870 Refreshed is that's what we need to do here. 37 00:02:37,870 --> 00:02:40,530 In the next section we will configure Ekpe. 38 00:02:41,290 --> 00:02:45,430 Then we're going to create 10 users and join some pieces to the debate. 39 00:02:45,670 --> 00:02:45,910 Right. 40 00:02:46,360 --> 00:02:48,340 So I'll see you guys in the next lecture.