1 00:00:05,070 --> 00:00:10,530 We've seen how to test for vulnerabilities across a large number of systems so far in this course, 2 00:00:10,680 --> 00:00:16,290 and we're just scratching the surface of what you can do with Métis, Boyte and Calli Linux. 3 00:00:16,860 --> 00:00:22,190 There's just one platform that we haven't touched yet, and that is Android. 4 00:00:22,710 --> 00:00:25,200 So you thought you were safe when you're on your cell phone. 5 00:00:25,210 --> 00:00:28,800 They about two billion Android devices on the planet right about now. 6 00:00:29,310 --> 00:00:35,120 And about nine out of every 10 new cell phones that gets activated is an Android device. 7 00:00:35,130 --> 00:00:42,420 So this is a huge platform for attackers and it's a really important thing for us to learn to secure 8 00:00:42,420 --> 00:00:42,940 as well. 9 00:00:43,380 --> 00:00:49,410 So in this section, we're going to see how to use Métis, Boyte and Interpretor to launch an attack 10 00:00:49,410 --> 00:00:54,440 on a Google Android device just the same as we have with Windows seven and Windows 10. 11 00:00:54,780 --> 00:01:01,360 So let's fire up our Android six device and let's just double check that our network is still a V box, 12 00:01:01,380 --> 00:01:02,060 net zero. 13 00:01:02,070 --> 00:01:05,040 We don't want to do anything that could go out over our public network. 14 00:01:05,380 --> 00:01:08,730 The box net zero is our host only adapter, remember? 15 00:01:09,300 --> 00:01:13,250 And as long as that is selected, you're going to be OK for this exercise. 16 00:01:13,590 --> 00:01:17,490 Make sure that you still have your Kelly Linux running on the same network. 17 00:01:17,910 --> 00:01:19,470 So just double check that it's on the host. 18 00:01:19,470 --> 00:01:20,970 Only the box net zero. 19 00:01:20,970 --> 00:01:27,780 If not, you need to change it and then come to the bottom right corner and disconnect and reconnect 20 00:01:27,780 --> 00:01:28,890 it to the network. 21 00:01:29,460 --> 00:01:33,780 Once you get those two things done, you're ready to jump right into hacking Android. 22 00:01:33,990 --> 00:01:36,950 And we'll use some of the familiar tools that we've seen before. 23 00:01:36,960 --> 00:01:43,230 Again, just barely scratching the surface of what's possible with Métis Boite, an interpreter, but 24 00:01:43,260 --> 00:01:48,690 giving you a really good idea that some of the oldies are still useful in the world today, even on 25 00:01:48,690 --> 00:01:49,800 mobile devices.