1 00:00:10,020 --> 00:00:17,390 Let us see how to download and install floatable on virtual box in the last lecture. 2 00:00:17,780 --> 00:00:21,320 You saw how to install BBWAA in Khaleel Linux. 3 00:00:21,990 --> 00:00:29,290 We have to follow the same procedure, go to your favorite browser and then hit download metastable 4 00:00:29,290 --> 00:00:29,670 table. 5 00:00:34,790 --> 00:00:36,110 There are two links to download. 6 00:00:36,500 --> 00:00:44,270 First is the information that Rabbitt, not seven dot com, but in this case you have to enter everything 7 00:00:44,510 --> 00:00:45,730 and work email. 8 00:00:46,040 --> 00:00:51,380 The Rapid Seven doesn't actually accept added Gmail dot com e mails. 9 00:00:51,770 --> 00:00:54,740 So it can be a pretty confusing thing. 10 00:00:54,740 --> 00:01:03,950 So I would prefer to download from source fortunate dot com, so hit download and wait till the file 11 00:01:04,070 --> 00:01:05,210 gets downloaded. 12 00:01:09,060 --> 00:01:13,680 You can see my file is downloading and I'm saving it in a download section. 13 00:01:15,080 --> 00:01:22,820 The file is 825 Mvezo, depending upon your Internet connectivity, it will take around 30 to 45 minutes 14 00:01:23,090 --> 00:01:24,620 to completely get downloaded. 15 00:01:26,620 --> 00:01:30,890 Rula, I have fast forwarded the video and my file has been downloaded. 16 00:01:31,280 --> 00:01:34,090 Go to the download section and extract the contents. 17 00:01:34,940 --> 00:01:36,920 This time, be patient. 18 00:01:41,780 --> 00:01:48,020 All the contents of the metastable table now have been extracted navigate to the folder where we have 19 00:01:48,020 --> 00:01:54,340 downloaded the contents, you can see a full table and you can also see different files. 20 00:01:54,350 --> 00:01:58,380 We are interested in the woolshed machine disk format file. 21 00:01:59,450 --> 00:02:00,230 What's next? 22 00:02:01,280 --> 00:02:02,810 Go to the virtual box. 23 00:02:03,470 --> 00:02:04,160 Click new. 24 00:02:06,330 --> 00:02:09,090 Give the name as Marcus Floatable. 25 00:02:13,020 --> 00:02:21,810 Select the operating systems as Linux and Virgin as Ubuntu 64 032, but depending upon your system, 26 00:02:23,320 --> 00:02:27,770 cannot create the virtual machine folder because the name already exists. 27 00:02:27,780 --> 00:02:31,710 So I will give a different name Mata's floatable application. 28 00:02:31,950 --> 00:02:33,840 Or you can give anything you want. 29 00:02:35,070 --> 00:02:35,740 It should work. 30 00:02:35,780 --> 00:02:42,600 Yes, when one behram is enough, then you have to create use an existing virtual hard disk in the same 31 00:02:42,600 --> 00:02:44,210 way you have to navigate to the folder. 32 00:02:45,600 --> 00:02:48,510 Select the virtual disk image format. 33 00:02:49,500 --> 00:02:50,070 There you go. 34 00:02:50,070 --> 00:02:51,990 Melters portable open. 35 00:02:53,170 --> 00:03:00,470 You have to choose it and then create so you can see where that particular application has been created. 36 00:03:01,420 --> 00:03:10,000 Look like start before starting, you have to do not forget that you have to select the next network, 37 00:03:10,240 --> 00:03:13,710 as we had selected in the previous lectures for David. 38 00:03:15,070 --> 00:03:19,240 So with that portable machine get started. 39 00:03:21,210 --> 00:03:26,700 This process will take really a lot of time, around 10 to 15 minutes, because they're going to start 40 00:03:26,700 --> 00:03:28,250 this machine for the first time. 41 00:03:30,230 --> 00:03:36,930 Turn on your calendar next machine and login into your machine, let us wait till midnight portable 42 00:03:36,950 --> 00:03:37,610 starts. 43 00:03:44,820 --> 00:03:54,630 They will the logging is MSF admin and password is also MSF admin, this is same as Divya Blooey, isn't 44 00:03:54,630 --> 00:03:54,810 it? 45 00:03:55,200 --> 00:03:55,770 Yes. 46 00:04:02,460 --> 00:04:09,430 Type, if I have config to know the IP address, the IP address is ten point or point two point fifteen. 47 00:04:09,900 --> 00:04:13,650 Now go to your ugali login into Karlee. 48 00:04:16,200 --> 00:04:17,860 Do you remember the default password? 49 00:04:18,000 --> 00:04:20,670 Yes, Carly Linux, yes. 50 00:04:21,450 --> 00:04:28,710 So now navigate to your favorite browser, which is nothing other than the Firefox browser available 51 00:04:28,710 --> 00:04:29,850 in Linux. 52 00:04:32,940 --> 00:04:34,470 So go to Firefox's. 53 00:04:35,730 --> 00:04:38,370 And then what you have to do. 54 00:04:39,410 --> 00:04:43,970 Easier to type the IP address of the metastable machine. 55 00:04:47,510 --> 00:04:57,620 So I am typing the IP address, ten point zero point two point fifteen, you can see the IP address, 56 00:04:58,010 --> 00:05:01,040 make sure you check and enter the correct IP address. 57 00:05:13,460 --> 00:05:22,280 Unable to connect why or yes, if you have observed closely, I didn't configure the network issue, 58 00:05:22,970 --> 00:05:31,340 so I will turn off moment exploitable by entering the password and then what I will do is I will configure 59 00:05:31,340 --> 00:05:38,490 the net network for as portable so that my coffee machine and metastable table are in the same network. 60 00:05:39,620 --> 00:05:41,390 So click settings. 61 00:05:44,370 --> 00:05:45,420 Go to network. 62 00:05:47,510 --> 00:05:55,850 That network and hit enter again, start metastable portable again, enter the password and then go 63 00:05:55,860 --> 00:05:57,110 down the IP address. 64 00:05:58,860 --> 00:06:05,970 Let the sweet Little Mermaid table machine get started, starting these machines is a tedious task as 65 00:06:05,970 --> 00:06:07,840 they have to start all the services again. 66 00:06:08,340 --> 00:06:13,740 So a massive admin and password is also a massive admin. 67 00:06:16,070 --> 00:06:22,790 I will knock down my IP address and my IP address is ten point zero point two point forty. 68 00:06:26,400 --> 00:06:32,820 If you see right behind us change this time, so make sure you check your I.P. address for every installation. 69 00:06:39,750 --> 00:06:46,440 There you go, we have a successful installment as portable, and this is my album, which is meant 70 00:06:46,440 --> 00:06:52,620 for hacking purposes, then this DPW is the same machine which we have installed on Carly. 71 00:06:55,420 --> 00:06:56,650 You can see it is seen. 72 00:06:59,890 --> 00:07:05,460 But this is slightly a different version than the original DPW, because it doesn't have a few vulnerabilities 73 00:07:05,460 --> 00:07:07,170 that haven't been uploaded here. 74 00:07:09,110 --> 00:07:15,320 So you can see all these vulnerabilities are present and we are going to practice exploiting all of 75 00:07:15,320 --> 00:07:17,720 these vulnerabilities in the upcoming lecture's. 76 00:07:19,160 --> 00:07:26,210 While inclusion, SQL injection accesses, file, upload, brute force, command, execution access 77 00:07:26,290 --> 00:07:26,900 is stored. 78 00:07:26,940 --> 00:07:33,200 All of these are going to try and these vulnerabilities, you should understand, because these are 79 00:07:33,200 --> 00:07:34,720 the top 10 vulnerabilities. 80 00:07:35,720 --> 00:07:37,790 So let's go to Matilda. 81 00:07:38,060 --> 00:07:41,390 Matilda is another practicing machine for hacking. 82 00:07:41,420 --> 00:07:49,170 You can see they have UPS top 10 when the reality is if you click information, you may get entire documentation. 83 00:07:49,550 --> 00:07:50,990 So there you go. 84 00:07:51,000 --> 00:07:52,970 You have Web crosseyed scripting. 85 00:07:52,970 --> 00:07:56,390 You can see there is a lot of practice content available. 86 00:07:56,780 --> 00:08:02,810 So make sure that after learning, after watching the video lectures, you go to these machines and 87 00:08:03,170 --> 00:08:05,990 practice all of these little bit on your own. 88 00:08:06,470 --> 00:08:12,260 In the lectures, we are going to show you the basic excitement and we are going to tell you that you 89 00:08:12,260 --> 00:08:20,900 do not have to use these exploits or these hacking tools on legitimate live websites before taking the 90 00:08:20,900 --> 00:08:24,250 proper authorization of the personal make. 91 00:08:24,260 --> 00:08:28,750 Supposed to decide to use a hacking tool on, let's say, Flipkart dot com. 92 00:08:29,000 --> 00:08:33,050 You are legally not allowed to do that before prior consent. 93 00:08:33,050 --> 00:08:41,020 And that is why penetration testers always take permissions before doing any test. 94 00:08:41,420 --> 00:08:47,690 So if you do if you perform this test illegally, you may end up in legal action. 95 00:08:47,690 --> 00:08:48,680 And that is not. 96 00:08:48,950 --> 00:08:56,210 And that is why we always tell students to please take legal permissions before doing anything.