1 00:00:00,510 --> 00:00:06,240 In this video, we are going to see what is at the box and how we can use it to practice backtesting. 2 00:00:06,990 --> 00:00:10,200 And we are going to crack our first machine on the box. 3 00:00:12,810 --> 00:00:18,450 Heck, the Box is a massive online cybersecurity training platform allowing individuals, companies, 4 00:00:18,450 --> 00:00:24,270 universities and all kinds of organizations around the world to level up their hacking skills. 5 00:00:25,180 --> 00:00:28,240 It is one of the best platforms to learn cybersecurity. 6 00:00:33,710 --> 00:00:36,560 You'll need to have a galley machine to practice by testing. 7 00:00:39,090 --> 00:00:42,420 First of all, browse to the box and sign up for a new account. 8 00:00:44,750 --> 00:00:50,240 The second step is to download the VPN and connect to playground and start hitting some machines. 9 00:00:55,140 --> 00:00:57,210 Let's see some actual demonstration. 10 00:00:59,820 --> 00:01:04,319 So after you have signed up for the Xbox account, you can go to the starting point. 11 00:01:09,110 --> 00:01:11,000 Select the types of machines. 12 00:01:16,040 --> 00:01:18,080 And select the connect to starting point. 13 00:01:19,470 --> 00:01:20,970 The download the European. 14 00:01:28,530 --> 00:01:30,180 Now open your downloads. 15 00:01:36,820 --> 00:01:40,990 Then the terminal and give the open VPN command to connect to it. 16 00:01:44,460 --> 00:01:45,570 No, minimize it. 17 00:01:48,300 --> 00:01:50,100 They'll get back to the box. 18 00:01:52,080 --> 00:01:54,120 And you can see that you are online now. 19 00:01:58,430 --> 00:02:00,350 The second step spawned the machine. 20 00:02:11,640 --> 00:02:14,310 Open a new terminal and check your IP address. 21 00:02:18,050 --> 00:02:21,320 It is 10.10 or 14.8 in this case. 22 00:02:22,320 --> 00:02:25,650 Once our target machine has started, you can see its IP address. 23 00:02:27,340 --> 00:02:29,700 You can bring the machine to check the connectivity. 24 00:02:36,330 --> 00:02:42,870 We'll get back to the box and let's start asking the questions as it is very basic machines. 25 00:02:42,960 --> 00:02:44,610 Many basic questions are asked. 26 00:02:45,890 --> 00:02:47,870 So VMS stands for Virtual Machine. 27 00:02:49,320 --> 00:02:50,970 And click on Submit answer. 28 00:02:52,170 --> 00:02:57,900 The second question is what role do we use to interact with the operating system, which is terminal 29 00:02:57,900 --> 00:02:58,830 in our case? 30 00:03:07,090 --> 00:03:12,940 The third question is what service do we use to form our VPN connection to head the box labs, which 31 00:03:12,940 --> 00:03:14,770 is open VPN in our case? 32 00:03:20,220 --> 00:03:23,180 For Tusk it is asking the tunnel interface name. 33 00:03:28,490 --> 00:03:32,270 You can go back to the terminal and see it is due in. 34 00:03:44,070 --> 00:03:48,600 Knowing the fifth task, it is asking how we can check the connection to our target. 35 00:03:49,020 --> 00:03:52,140 And we have used the ping tool to test the connectivity. 36 00:03:59,160 --> 00:03:59,630 No. 37 00:03:59,640 --> 00:04:03,690 It is asking what is the most common tool for finding open pores on a target? 38 00:04:05,420 --> 00:04:07,430 It is Meb, as we already know. 39 00:04:17,959 --> 00:04:21,649 Number seven task is to identify the services on 23. 40 00:04:24,620 --> 00:04:24,720 No. 41 00:04:24,920 --> 00:04:26,150 Let's lodge an NEB. 42 00:04:26,190 --> 00:04:27,710 Scan against the target. 43 00:04:31,660 --> 00:04:33,810 What with the IP address of the target machine. 44 00:04:37,100 --> 00:04:37,820 The skin. 45 00:04:54,160 --> 00:04:57,490 And you can see the Telnet service is running on both the three. 46 00:05:07,220 --> 00:05:12,620 The next task is to find a username that is able to log into the target with the blank password. 47 00:05:15,340 --> 00:05:17,160 Let's attempt to connect the target. 48 00:05:28,500 --> 00:05:30,390 Let's try the the name. 49 00:05:31,400 --> 00:05:32,330 And we are in. 50 00:05:38,130 --> 00:05:41,130 You can also see a flag or text file in the directory. 51 00:05:50,380 --> 00:05:53,680 To see the content of the text file with the command. 52 00:06:00,200 --> 00:06:01,640 And somewhere that will flag. 53 00:06:04,470 --> 00:06:06,900 We successfully dragged our first machine.