1 00:00:08,640 --> 00:00:16,350 OK, so on the last lecture, I dug into the whole bug bounty idea and I showed you Bushcraft and Akre 2 00:00:16,350 --> 00:00:16,570 one. 3 00:00:17,010 --> 00:00:20,580 Now we're going to get into resource development with digital ocean. 4 00:00:21,100 --> 00:00:22,530 So there's a bunch of different options, right? 5 00:00:23,010 --> 00:00:29,490 This has been elastic compute cloud, etc. And there's actually an Amazon machine image for Calli. 6 00:00:30,240 --> 00:00:35,900 But we're going to actually use digital ocean because I find that it truly is simple. 7 00:00:36,360 --> 00:00:38,910 It's what the bug bounty community prefers. 8 00:00:39,300 --> 00:00:41,610 And in my opinion, it's more fun to set up this way. 9 00:00:41,790 --> 00:00:43,710 And in some cases, it's actually cheaper. 10 00:00:44,190 --> 00:00:48,630 And speaking of cheap, what I'm going to do is if you you can actually go to digital ocean dot com 11 00:00:48,630 --> 00:00:50,750 and you can sign up, you can get started. 12 00:00:50,940 --> 00:00:55,620 But if you use my referral link here, you'll actually get 100 dollars free credit. 13 00:00:56,160 --> 00:01:00,060 And so that'll give you more than enough to play with the labs in this course as well as experiment 14 00:01:00,060 --> 00:01:00,630 on your own. 15 00:01:00,810 --> 00:01:07,680 Well, after the course finishes, so Digital Ocean makes these referral links available to all their 16 00:01:07,680 --> 00:01:08,160 customers. 17 00:01:08,400 --> 00:01:09,660 So you can help me out by clicking this. 18 00:01:09,660 --> 00:01:10,230 You don't have to. 19 00:01:10,230 --> 00:01:16,230 But if you do want to help me out and I actually get 25 dollars after you use up your 100 dollars and 20 00:01:16,230 --> 00:01:21,030 you start to spend 25 dollars with the ocean, I get twenty five dollars in my digital ocean account. 21 00:01:21,240 --> 00:01:24,360 Once you sign up, what you'll do is you'll sign it. 22 00:01:25,020 --> 00:01:26,280 And you can see here I'm logged in. 23 00:01:26,280 --> 00:01:27,330 My usage is pretty low. 24 00:01:28,020 --> 00:01:31,670 I only have one domain, but what we want to do is create a virtual server. 25 00:01:32,070 --> 00:01:37,380 This is known as a VPs or virtual private server, and in digital ocean speak they're called droplets. 26 00:01:37,710 --> 00:01:42,780 So we can either click, create a droplet here or we can go up to the top click, create and go to droplets. 27 00:01:44,510 --> 00:01:49,700 So we're going to keep Kelly in the cloud, Kelly Lennox in the cloud, so we're going to want to use 28 00:01:49,700 --> 00:01:50,120 Debian. 29 00:01:52,010 --> 00:01:53,150 And we'll use version nine. 30 00:01:55,070 --> 00:01:57,510 And I'm going to get a pretty beefy box now with your free credit. 31 00:01:57,530 --> 00:01:58,700 This will be nothing, right? 32 00:01:58,910 --> 00:02:03,500 So you can go ahead and use the 40 dollars a month if you want to have a really beefy system, or you 33 00:02:03,500 --> 00:02:06,360 can just go for, you know, a cheaper option, to be honest. 34 00:02:06,380 --> 00:02:08,700 Twenty four dollars a month option will be more than adequate. 35 00:02:09,080 --> 00:02:13,250 So what we can do is after we create that, which is a data center, I'm going to pick New York. 36 00:02:16,870 --> 00:02:21,610 And then we need to create a way of accessing it so we're not going to get into the VPs through a password, 37 00:02:22,330 --> 00:02:23,650 as you see, it's less secure. 38 00:02:23,680 --> 00:02:25,680 Instead, we're going to create and assess each key. 39 00:02:26,200 --> 00:02:28,480 And you can see I've got a few here that I've already created. 40 00:02:28,860 --> 00:02:29,650 Let's create a new one. 41 00:02:30,760 --> 00:02:35,920 And it actually tells you how to do this so we can run SFH Keija click copy. 42 00:02:36,490 --> 00:02:42,700 And you can see here on my host machine, I've got a folder called DSH in a digital ocean folder, which 43 00:02:42,700 --> 00:02:43,600 is in my documents. 44 00:02:44,350 --> 00:02:46,240 And yes, I did spell my name wrong. 45 00:02:47,110 --> 00:02:48,050 I type in my own name. 46 00:02:48,070 --> 00:02:48,640 Isn't that crazy? 47 00:02:49,240 --> 00:02:49,920 Anyway, if you right. 48 00:02:49,930 --> 00:02:53,200 Click on the window you can piece it in. 49 00:02:53,200 --> 00:02:57,760 So it's going to say OK, into the file in which to save the key, we'll just keep the default. 50 00:02:57,770 --> 00:03:04,330 Idrissi and I already have a key there, so I'm just going to overwrite it and I'm not going to put 51 00:03:04,330 --> 00:03:04,920 a password in. 52 00:03:06,240 --> 00:03:09,670 And of course, for you, you might want to put a password, but we're just doing this for demonstration 53 00:03:09,670 --> 00:03:10,210 purposes. 54 00:03:10,900 --> 00:03:11,170 All right. 55 00:03:11,180 --> 00:03:13,150 Now that we've got that, let's go back to the instructions. 56 00:03:13,970 --> 00:03:14,920 So we saved the key. 57 00:03:15,560 --> 00:03:16,150 We did that. 58 00:03:17,440 --> 00:03:19,090 We did the passphrase thing. 59 00:03:19,630 --> 00:03:23,320 And now we should have an RSA and ID, RSA pub. 60 00:03:23,560 --> 00:03:24,420 Let's see if we have that. 61 00:03:24,520 --> 00:03:25,450 Well, we don't have it here. 62 00:03:26,440 --> 00:03:27,370 That's because it's here. 63 00:03:28,120 --> 00:03:28,480 Right. 64 00:03:28,490 --> 00:03:29,710 So let's go and grab these files. 65 00:03:30,370 --> 00:03:31,230 So what I'm going to do this. 66 00:03:31,240 --> 00:03:37,150 I'm going to copy and copy and I copy that to this directory. 67 00:03:40,600 --> 00:03:42,610 Now we can see it and we'll just grab the other one as well. 68 00:03:42,770 --> 00:03:43,150 Hold on. 69 00:03:43,150 --> 00:03:43,690 Control. 70 00:03:44,050 --> 00:03:44,860 Just keep around. 71 00:03:47,770 --> 00:03:49,180 And then just put that one here as well. 72 00:03:52,500 --> 00:03:54,310 Now, we've got a suite there. 73 00:03:54,360 --> 00:03:57,820 We're going to do is it saying, OK, copy and paste the contents of the pub file. 74 00:03:58,170 --> 00:04:02,270 Typically, the Idrissi pop into the SSA content field on the left. 75 00:04:02,670 --> 00:04:06,930 So we can't use that because we're using Windows as our host box. 76 00:04:07,710 --> 00:04:08,610 So I can do a type. 77 00:04:11,460 --> 00:04:12,270 I can grab this. 78 00:04:14,500 --> 00:04:17,440 So I just right click it after I selected Fatback over here. 79 00:04:18,520 --> 00:04:22,330 That guy and you name it modern ethical hacking. 80 00:04:24,340 --> 00:04:24,610 All right. 81 00:04:24,610 --> 00:04:25,630 So we've got our S.A.G.. 82 00:04:25,840 --> 00:04:26,470 Very good. 83 00:04:27,480 --> 00:04:32,400 And now finalizing how many droplets we just need one and we'll name it Kelly. 84 00:04:33,920 --> 00:04:34,910 Everything else looks good. 85 00:04:34,940 --> 00:04:35,840 Let's create this droplet. 86 00:04:39,730 --> 00:04:43,540 So we're going to go ahead and get this created in the next lecture, what we're going to do is we're 87 00:04:43,540 --> 00:04:47,710 actually going to log into the system and set it up to actually be Cowley's in the cloud. 88 00:04:48,640 --> 00:04:50,980 I'll see you guys in the next lecture.