1 00:00:03,340 --> 00:00:03,910 Hey, gang. 2 00:00:03,930 --> 00:00:10,480 One quick note for 2020 and newer students who are joining the class and haven't downloaded the Windows 3 00:00:10,480 --> 00:00:13,120 seven or Windows eight virtual machines. 4 00:00:13,570 --> 00:00:18,550 Microsoft no longer offers those machines free and legal online. 5 00:00:19,000 --> 00:00:23,320 So it can't just go out and grab a copy of a Windows seven or Windows eight virtual machine anymore. 6 00:00:23,350 --> 00:00:24,100 I'm so sorry. 7 00:00:24,790 --> 00:00:30,280 I'm going to leave this section, though, up in the course so that you can see how to hack into a Windows 8 00:00:30,280 --> 00:00:37,120 seven box because there's still plenty of them out there in industry and in homes and businesses and 9 00:00:37,120 --> 00:00:38,680 hospitals and everything. 10 00:00:38,680 --> 00:00:43,120 And we need to learn how to protect them from people who are trying to break into those older systems. 11 00:00:43,750 --> 00:00:49,780 But if you've even got a Windows seven computer sitting in your house, you can actually hack from Caleigh 12 00:00:49,780 --> 00:00:51,790 into that Windows seven box. 13 00:00:52,210 --> 00:00:54,920 You have to be very careful if you ever do this. 14 00:00:54,940 --> 00:00:59,560 I want to show you one quick way, but it needs to come with a really important ethical hacking warning. 15 00:00:59,590 --> 00:01:06,340 Number one, if you're on anybody else's network, not just your own personal home network, if you're 16 00:01:06,340 --> 00:01:10,180 on your school or work or on a public network or on Wi-Fi. 17 00:01:10,600 --> 00:01:11,860 This can get you in trouble. 18 00:01:11,860 --> 00:01:17,740 In fact, it can be illegal in some parts of the world to even connect to the network, much less to 19 00:01:17,740 --> 00:01:19,510 try to send a hack across it. 20 00:01:20,020 --> 00:01:25,270 But I'm going to show you really quickly how you can connect to a Windows seven physical laptop in your 21 00:01:25,270 --> 00:01:30,940 own Wi-Fi environment so that you'd be able to connect to it and actually practice some of the hacking 22 00:01:30,940 --> 00:01:35,230 so that you can see how to secure your Windows seven machine from those types of attacks. 23 00:01:35,590 --> 00:01:42,130 So the easiest way to do that is actually to change your network setting on your Caleigh box to abridged 24 00:01:42,250 --> 00:01:44,440 adapter, abridged adapter. 25 00:01:44,450 --> 00:01:45,700 I'm not going to make that change here. 26 00:01:45,700 --> 00:01:46,870 I'm just telling you how to do it. 27 00:01:46,930 --> 00:01:48,790 And I need to give you warnings to go along with it. 28 00:01:49,220 --> 00:01:55,150 A bridge adapter means that it's going to ask for an address on your public Wi-Fi or on your physical 29 00:01:55,150 --> 00:02:01,150 connection to your network, the same way it would if you just brought in a brand new Caleigh Linux 30 00:02:01,150 --> 00:02:03,370 laptop, a separate physical machine. 31 00:02:03,820 --> 00:02:11,140 And this is very dangerous for us to do as a learning ethical hackers, because real black hat attackers 32 00:02:11,200 --> 00:02:18,250 out there on the Internet will find addresses that are bridged like this that are an unprotected Windows 33 00:02:18,250 --> 00:02:21,040 machine, especially I met a split Nable device. 34 00:02:21,070 --> 00:02:26,890 That one is really dangerous to plug out, but an unprotected Windows virtual machine or even a Caleigh 35 00:02:26,890 --> 00:02:32,620 Linux virtual machine becomes a sitting duck for other attackers who might be sitting on the same network 36 00:02:32,920 --> 00:02:34,210 or sitting out on the Internet. 37 00:02:34,240 --> 00:02:35,440 So be very careful. 38 00:02:35,740 --> 00:02:42,010 You should only do this inside a network that you own and that you are responsible for, like your home 39 00:02:42,010 --> 00:02:46,750 Wi-Fi or a temporary network that you set up with physical cables. 40 00:02:47,140 --> 00:02:52,120 You can bridge the adapter and you can hack from your Kelly virtual machine to another machine on the 41 00:02:52,120 --> 00:02:53,140 same network. 42 00:02:53,200 --> 00:02:56,110 Remember, this can get you in big trouble if you misuse it, though. 43 00:02:56,470 --> 00:03:01,150 So if you're not sure, it's probably best to stay away from the bridge to dafter. 44 00:03:01,570 --> 00:03:07,930 But if you set up that bridge adapter and restart your Caleigh Linux box, you would be able to see 45 00:03:07,930 --> 00:03:10,030 out on your public network in your house. 46 00:03:10,060 --> 00:03:16,750 That's also the way that you would scan for things like digital video recorders, security cameras in 47 00:03:16,750 --> 00:03:21,970 your house, other IP enabled devices, your laptops, tablets, anything that you have around your 48 00:03:21,970 --> 00:03:28,450 house, including smart TV's you would be able to see on that bridged network with Kalli. 49 00:03:28,690 --> 00:03:34,660 But be very careful if you ever decide to use that bridge adapter because it puts your Caleigh machine 50 00:03:35,050 --> 00:03:41,740 out on your network so that it can see things like your doorbell camera, your your smart TV is your 51 00:03:41,740 --> 00:03:45,160 Apple and Amazon devices all throughout your house. 52 00:03:45,190 --> 00:03:50,860 So be very careful with Caleigh Linux setup, unabridged adapter and always switch back to either you're 53 00:03:50,860 --> 00:03:55,000 not in network public nat'l or your private hosts only D-Box net zero. 54 00:03:56,020 --> 00:04:00,970 We don't want you to get in trouble for learning how to use this, but I'm going to leave this Windows 55 00:04:01,000 --> 00:04:07,600 seven demo up for you so that you'll be able to see how you can practice your ethical hacking skills 56 00:04:07,600 --> 00:04:08,680 on Windows seven machines. 57 00:04:08,680 --> 00:04:11,890 You still see these used, especially in big industries. 58 00:04:12,280 --> 00:04:15,040 So it's a really important thing to know how to defend against.