1 00:00:08,340 --> 00:00:14,640 OK, so in the last lecture, we set up the remaining piece of our domain controller, the BPP server. 2 00:00:14,850 --> 00:00:16,020 So we've got our scope defined. 3 00:00:16,020 --> 00:00:19,670 We've got our DNS records in place and we have a domain controller. 4 00:00:19,830 --> 00:00:20,820 But now we need users. 5 00:00:20,880 --> 00:00:21,140 Right. 6 00:00:21,180 --> 00:00:23,270 You can't really do much with domain if you don't have users. 7 00:00:23,280 --> 00:00:25,050 So we're just going to create two for this environment. 8 00:00:25,770 --> 00:00:29,030 There are tools you can use to just really pimp out your environment. 9 00:00:29,040 --> 00:00:31,750 For example, there's a tool called bad bloodiness. 10 00:00:31,770 --> 00:00:36,690 If you search for it on GitHub, it will create an intentionally vulnerable environment with random 11 00:00:36,690 --> 00:00:41,610 data to get random computer objects, random usernames, a bunch of randomisation. 12 00:00:41,610 --> 00:00:42,720 But I want more control. 13 00:00:42,720 --> 00:00:43,890 That's why I'm not doing it that way. 14 00:00:44,250 --> 00:00:47,760 But I think it's good if you actually configure yourself because then you get to learn first hand, 15 00:00:47,760 --> 00:00:48,010 right? 16 00:00:48,030 --> 00:00:49,110 So I'm all about the learning. 17 00:00:49,320 --> 00:00:53,220 So what we can do is we'll just go in here and we'll just go to users and computers. 18 00:00:54,330 --> 00:00:56,340 Right here, active directory users in computers. 19 00:00:57,090 --> 00:00:58,750 We're just going to create two users to start. 20 00:00:59,730 --> 00:01:01,430 So I'm going to go ahead and expand my domain. 21 00:01:01,440 --> 00:01:02,820 I'm going to go to Geyser's. 22 00:01:04,940 --> 00:01:09,540 And you can see we don't really have many we just have guessed right, and we should have an administrator. 23 00:01:09,560 --> 00:01:09,880 We do. 24 00:01:10,310 --> 00:01:12,170 So I'm just going to right. 25 00:01:12,170 --> 00:01:15,560 Click in here and I'm going to go to new user. 26 00:01:16,740 --> 00:01:21,240 Let's create our yuzu that this is what I use for my labs and all my training, it's made his name up, 27 00:01:22,410 --> 00:01:28,980 Randy Moralez and he can use the name are more rallies. 28 00:01:30,480 --> 00:01:31,040 All right. 29 00:01:31,050 --> 00:01:31,770 Looks good. 30 00:01:32,910 --> 00:01:34,770 And we'll create a basic password for him 31 00:01:38,790 --> 00:01:40,680 and check user must change password next. 32 00:01:42,390 --> 00:01:45,690 And then we're just going to click next and create our. 33 00:01:46,110 --> 00:01:46,670 Very cool. 34 00:01:47,220 --> 00:01:48,450 Let's create one more user. 35 00:01:51,030 --> 00:01:59,370 And this will be Jacqueline B. Pollard again, if you're wondering where did I get these names from, 36 00:01:59,370 --> 00:02:03,260 literally all I did was I just went to Google and I typed, like, random name generator. 37 00:02:03,540 --> 00:02:03,760 Right. 38 00:02:03,920 --> 00:02:04,680 That's all I did. 39 00:02:04,690 --> 00:02:06,630 And I just use one of those names. 40 00:02:07,350 --> 00:02:08,780 So don't overthink this process. 41 00:02:09,300 --> 00:02:13,920 So her user login name will be Jay Pollard. 42 00:02:15,090 --> 00:02:16,000 Looks good. 43 00:02:16,060 --> 00:02:16,830 We'll click next. 44 00:02:17,190 --> 00:02:18,150 Put in her password 45 00:02:22,680 --> 00:02:25,290 and uncheck user must change your password at next log on click. 46 00:02:25,290 --> 00:02:26,020 Next finish. 47 00:02:26,640 --> 00:02:27,230 Very cool. 48 00:02:28,080 --> 00:02:31,350 And I'm going to make this a little bit more believable by going to properties. 49 00:02:33,280 --> 00:02:40,050 And the description CEO and founder office. 50 00:02:40,980 --> 00:02:43,110 Let's say we'll say E 51 00:02:45,840 --> 00:02:46,200 14. 52 00:02:46,620 --> 00:02:47,940 That's just a random office. 53 00:02:48,150 --> 00:02:53,580 Maybe they're on the 14th floor of a building telephone number to one, two by five. 54 00:02:55,310 --> 00:02:58,090 Five zero zero one email. 55 00:02:58,460 --> 00:03:03,230 Now, this is a real email address I'm going to put in here and we'll talk about this in an upcoming 56 00:03:03,230 --> 00:03:03,680 lecture. 57 00:03:04,010 --> 00:03:06,050 But you're going to want to purchase a domain. 58 00:03:06,080 --> 00:03:08,970 I use GoDaddy and then you're going to want to get email set up for that. 59 00:03:09,080 --> 00:03:13,210 I know it's an additional cost, but this is how you really learn about hacking, right? 60 00:03:13,220 --> 00:03:17,340 Because once you have a valid email address, like a real email address that you can send email to, 61 00:03:17,420 --> 00:03:21,680 that's not Gmail or something like that, then you can start playing with initial access. 62 00:03:22,100 --> 00:03:29,150 Right, spearfishing your fictitious users, maybe, you know, coaxing your fictitious user into landing 63 00:03:29,150 --> 00:03:31,880 on a malicious website, drive by download. 64 00:03:32,300 --> 00:03:32,660 Right. 65 00:03:32,660 --> 00:03:36,950 Or maybe you can explain it to attack a vulnerability and unpatched browser. 66 00:03:37,310 --> 00:03:40,550 But you can't really do that if you don't have an email account, you can't get the whole show off and 67 00:03:40,550 --> 00:03:41,180 make it realistic. 68 00:03:41,210 --> 00:03:48,260 So I'm a big fan of purchasing a legit email address and purchasing a legit domain and then using that 69 00:03:48,260 --> 00:03:48,820 for testing. 70 00:03:49,040 --> 00:03:49,900 So that's what I'm going to do. 71 00:03:49,910 --> 00:03:52,100 I'm going to put in his email address 72 00:03:56,540 --> 00:04:00,500 and the webpage Carbon Buy.com. 73 00:04:01,190 --> 00:04:02,120 Hey, that looks good. 74 00:04:02,540 --> 00:04:03,350 Click OK here. 75 00:04:04,130 --> 00:04:05,900 And we'll do something similar for Jacklin. 76 00:04:06,880 --> 00:04:07,930 She is the CFO. 77 00:04:10,000 --> 00:04:12,500 Her office is one floor up, a phone number. 78 00:04:15,280 --> 00:04:16,940 There we go with her email address. 79 00:04:16,960 --> 00:04:23,010 It's Jack Quinn, that Pollard at Carbon Bank Dotcom. 80 00:04:23,680 --> 00:04:25,480 Now, at the time, I think it was like five dollars. 81 00:04:25,480 --> 00:04:27,660 An email address is what I paid GoDaddy. 82 00:04:27,670 --> 00:04:28,390 That may change. 83 00:04:28,560 --> 00:04:33,240 You can sometimes find coupons online, but it's not very it's not very expensive. 84 00:04:35,790 --> 00:04:38,080 And think my domain was like nine dollars. 85 00:04:38,080 --> 00:04:38,860 Right, for the year. 86 00:04:39,190 --> 00:04:41,890 Carbon Buy.com right there looks pretty good. 87 00:04:51,850 --> 00:04:54,640 To both these accounts look pretty good and a believe for good here. 88 00:04:54,670 --> 00:04:59,740 So now that we have our accounts, what we need to do is join our pieces to the demands of the next 89 00:04:59,740 --> 00:05:00,010 lecture. 90 00:05:00,030 --> 00:05:00,700 That's what we'll do. 91 00:05:01,270 --> 00:05:05,110 I'll see you guys in the next lecture when we start to joint our machines to the domain. 92 00:05:05,680 --> 00:05:06,880 Zenovich by.