1 00:00:07,030 --> 00:00:13,900 To complete our set up of our ethical virtual hacking labs, we're going to see how to set up two different 2 00:00:13,900 --> 00:00:14,650 networks. 3 00:00:15,040 --> 00:00:19,450 We usually like to do ethical hacking inside a closed virtual lab. 4 00:00:19,490 --> 00:00:25,780 That means a private host only network where we can only see the other machines in our ethical hacking 5 00:00:25,780 --> 00:00:28,900 lab not see out to the Internet or vice versa. 6 00:00:28,920 --> 00:00:30,510 Now have the Internet see into us. 7 00:00:30,850 --> 00:00:36,850 So we're going to create a host only network in virtual box that will be a private network just for 8 00:00:36,850 --> 00:00:39,030 our machines and our virtual hacking lab. 9 00:00:39,580 --> 00:00:44,650 That means that we're only going to be able to see from one machine to the other and to our host computer 10 00:00:44,650 --> 00:00:48,080 and from the host computer down into our individual machines. 11 00:00:48,310 --> 00:00:56,170 So this host, only the network is going to have an address range of 10 dot dot three dot some number 12 00:00:56,170 --> 00:00:57,450 from four to 100. 13 00:00:58,030 --> 00:01:03,460 You can go anywhere from one to two hundred fifty four here, but we'll use the range from four to 100 14 00:01:03,460 --> 00:01:04,540 for our machines. 15 00:01:05,050 --> 00:01:06,360 It'll do a couple of things for us. 16 00:01:06,370 --> 00:01:13,330 First of all, it will keep us safe from the Internet so no one can sniff around and find out Linux 17 00:01:13,330 --> 00:01:13,810 box. 18 00:01:14,020 --> 00:01:18,490 No one can sniff around and find out Métis floatable box or even our Windows 10 virtual machines or 19 00:01:18,490 --> 00:01:19,600 Android and so on. 20 00:01:20,050 --> 00:01:24,880 But it will also keep our local area network and the Internet safe from us. 21 00:01:25,240 --> 00:01:31,240 The Calli Linux boxes we saw when we set it up has tons of tools installed in it for Forensic's, for 22 00:01:31,240 --> 00:01:33,850 penetration testing, for real hacking. 23 00:01:34,150 --> 00:01:39,550 And we need to be responsible when we're using that Kelly Linux machine, when we're ethically hacking, 24 00:01:39,550 --> 00:01:43,390 we don't hack networks that we don't have permission to access. 25 00:01:43,720 --> 00:01:46,180 So we can do some things at home in our local area network. 26 00:01:46,180 --> 00:01:53,230 But we usually don't even want Cauli sniffing our Blu ray disc machine, our wireless adapter for wireless 27 00:01:53,230 --> 00:01:56,380 Internet, any security cameras in the house, things like that. 28 00:01:56,680 --> 00:02:02,050 So we want to make sure that we protect ourselves from the Internet and protect the Internet and our 29 00:02:02,050 --> 00:02:09,460 local area network from our Caleigh machine especially so that 10 Dorota three will be our private network. 30 00:02:10,000 --> 00:02:17,260 Then sometimes we'll want to connect to the Internet just to surf, surf the web or to get some updates 31 00:02:17,260 --> 00:02:18,490 for a particular machine. 32 00:02:19,150 --> 00:02:23,560 And we'd still like to be able to see from one machine into another when we connect it out to that public 33 00:02:23,560 --> 00:02:23,980 Internet. 34 00:02:24,640 --> 00:02:31,600 In our social engineering hacking example, we're going to see how to copy the Facebook homepage and 35 00:02:31,600 --> 00:02:39,500 we'll see how to use this ten, not nine public network to set up a fishing page that could capture 36 00:02:39,520 --> 00:02:40,510 user's credentials. 37 00:02:40,750 --> 00:02:45,340 That's really useful for testing in a corporate environment to make sure that people are not clicking 38 00:02:45,340 --> 00:02:46,570 through to phishing emails. 39 00:02:46,840 --> 00:02:49,210 And if they are, we usually do some extra training with them. 40 00:02:49,210 --> 00:02:52,120 We'll see that in the social engineering section coming up. 41 00:02:52,570 --> 00:02:58,420 But for our lab set up to be complete, we need both a private network and a public network. 42 00:02:58,810 --> 00:03:04,900 The private network will be the ten point three set of addresses and our public network will be ten 43 00:03:04,900 --> 00:03:05,920 point nine. 44 00:03:05,920 --> 00:03:11,410 When we see ten point three something, we'll know that our computer is in a private hosted only network 45 00:03:11,410 --> 00:03:14,290 protected from everything and everything's protected from us. 46 00:03:14,830 --> 00:03:19,780 When we'll see the ten point nine, we'll know that we are on the public internet. 47 00:03:19,930 --> 00:03:26,350 We can connect and surf to a website, for example, to Facebook or to Google, or we can do our updates 48 00:03:26,350 --> 00:03:31,120 for Windows updates or do a pseudo app to get update for our Linux boxes. 49 00:03:31,900 --> 00:03:35,920 But we will also be exposed to the Internet and the Internet will be exposed to us. 50 00:03:35,920 --> 00:03:39,400 So we will usually live in this private network. 51 00:03:39,670 --> 00:03:44,140 But it's good also to have this public managed network set up so that we can still see from one machine 52 00:03:44,140 --> 00:03:49,690 into the other and we'll be able to connect out to the public Internet to get updates or do actual Web 53 00:03:49,690 --> 00:03:51,790 surfing or reconnaissance work if we need to. 54 00:03:52,300 --> 00:03:57,400 So we'll see how to set up our private hosts only network next and we'll see in the next lesson.