1 00:00:03,150 --> 00:00:11,130 We're going to learn how to use a tool called Metis Boit to hack from Caleigh into our Windows Ten VM. 2 00:00:11,460 --> 00:00:16,410 So to do that, we're going to need to run both our Caleigh and Windows virtual machines. 3 00:00:16,440 --> 00:00:21,690 And we're going to need to make sure that both of them are connected to the public mat network so that 4 00:00:21,690 --> 00:00:22,980 they'll be able to see one another. 5 00:00:23,330 --> 00:00:28,050 If you want to add a little extra safety and security, you can run this on your private hosts only 6 00:00:28,050 --> 00:00:29,970 network that V box net zero. 7 00:00:30,510 --> 00:00:34,080 But for this one, we may want to run out to the Internet to pull a file or two. 8 00:00:34,380 --> 00:00:35,810 So we'll keep it on public net. 9 00:00:36,090 --> 00:00:41,790 You are still protected from sending this information out over the Internet or from anybody accidentally 10 00:00:41,790 --> 00:00:49,230 hacking into you because you are on this private matted network, the network address translation network. 11 00:00:49,590 --> 00:00:54,060 So we've made sure that we've got our Caleigh and Windows machines on the public net network. 12 00:00:54,330 --> 00:00:59,910 We can check that by running each of those machines and then doing an IP config on our Windows computer. 13 00:01:00,480 --> 00:01:04,110 And then remember your password if you need it to log into your windows. 14 00:01:04,110 --> 00:01:07,130 Computer is password p a. 15 00:01:07,130 --> 00:01:07,700 S s. 16 00:01:07,830 --> 00:01:12,300 That's a capital P a little a ss w zero d exclamation. 17 00:01:12,810 --> 00:01:16,440 And then we can run the command prompt and run IP config. 18 00:01:16,770 --> 00:01:20,850 We can see I've got a 10 DataDot nine something address so we know we're on the public map. 19 00:01:21,190 --> 00:01:25,620 Need to log in on my Khaliq computer on newer Caleigh distributions. 20 00:01:25,620 --> 00:01:27,100 That's Caleigh and Kalli. 21 00:01:27,690 --> 00:01:36,380 If you have a pre 2020 version of Kalli that will be route and tor route, our double o t and that's 22 00:01:36,390 --> 00:01:38,880 t o r as the password. 23 00:01:40,280 --> 00:01:46,100 And we're going to start up the tool called Metis, Beloit Meadows, Boit is under our. 24 00:01:47,450 --> 00:01:49,040 Section zero eight. 25 00:01:49,190 --> 00:01:51,050 Exploitation tools. 26 00:01:51,530 --> 00:01:57,160 You'll see under oh eight exploit tools, Metis Boit Framework Metacarpal. 27 00:01:57,180 --> 00:02:03,560 It has often been called the Swiss Army Knife of Hacker Tools because it gives us access to thousands 28 00:02:03,620 --> 00:02:12,500 of different exploits and attacks for not just Windows, but Mac I US iPhones, Android devices, you 29 00:02:12,500 --> 00:02:14,920 name it, their exploits in Meadow's Beloit. 30 00:02:15,590 --> 00:02:21,050 It may ask you the first time for your pseudo password on the newer versions of Kalli. 31 00:02:21,050 --> 00:02:22,190 That is K-Tel. 32 00:02:22,220 --> 00:02:24,290 I just Caleigh all lowercase. 33 00:02:25,490 --> 00:02:26,940 It'll take just a moment to start up. 34 00:02:27,320 --> 00:02:34,610 And you usually see a fun piece of aski or text art that will come up as you begin your Metis political 35 00:02:34,610 --> 00:02:35,060 box. 36 00:02:35,330 --> 00:02:41,480 But metastable, it will contain a couple of thousand different attacks and exploits for everything 37 00:02:41,480 --> 00:02:49,100 from PD FS to Web pages to all of the different types of desktop, laptop and mobile device operating 38 00:02:49,100 --> 00:02:50,360 systems that you'd expect. 39 00:02:50,810 --> 00:02:58,640 You can see I have an updated mine since we set Caleigh up in an earlier section, but I've got over 40 00:02:58,790 --> 00:03:03,180 2000 exploits over eleven hundred auxiliary tools. 41 00:03:03,200 --> 00:03:08,960 Those are things like scanners and vulnerability assessment tools post exploitation as being something 42 00:03:08,960 --> 00:03:13,500 that we can do after we've attacked a remote machine, 562 payloads. 43 00:03:13,530 --> 00:03:18,490 Those are the actual pieces of malware that will allow us to attack and gain control of a remote machine. 44 00:03:18,980 --> 00:03:25,940 You can see there are lots of fun, lots of useful tools in Métis play for security testing. 45 00:03:26,810 --> 00:03:29,980 You'll see that we got you didn't say the magic word. 46 00:03:29,990 --> 00:03:31,130 You didn't say the magic word. 47 00:03:31,400 --> 00:03:37,010 You might get something like an Oregon Trail text art or a joke on the word Schell's. 48 00:03:37,010 --> 00:03:40,850 As you start up Meadow's point, it is made by hackers for hackers. 49 00:03:41,570 --> 00:03:44,420 So we've got the Metis Point five framework started. 50 00:03:44,930 --> 00:03:50,780 And when we come back in the next section, we're going to see how to create our own virus to be able 51 00:03:50,780 --> 00:03:55,160 to send over and securely test a Windows 10 computer.