1 00:00:00,180 --> 00:00:02,380 OK, now it's time to prepare the environment. 2 00:00:02,730 --> 00:00:09,180 The first thing we want to download and install virtual books, so from Google, download virtual books, 3 00:00:09,750 --> 00:00:15,250 go to the downloads and from here, choose the version you want regarding the platform you'll want. 4 00:00:15,510 --> 00:00:20,810 So Windows or host OS X for Mac, Linux Distribution, Solaris and so on. 5 00:00:21,060 --> 00:00:25,170 In my case, I am using Ubuntu, so I will choose in the next distribution. 6 00:00:26,490 --> 00:00:27,990 And I would have open to. 7 00:00:29,100 --> 00:00:30,450 20, which is this one. 8 00:00:30,670 --> 00:00:37,170 OK, and then after you install it, just follow the instructions, as you can see from here, and you 9 00:00:37,170 --> 00:00:39,020 can just install it as simple as that. 10 00:00:39,020 --> 00:00:40,330 The same thing for us. 11 00:00:40,350 --> 00:00:44,550 It's the Mack, the Mack and the same thing for Windows. 12 00:00:44,590 --> 00:00:46,450 OK, now this is the first thing. 13 00:00:46,740 --> 00:00:49,350 Know the second thing we want Kelly Linux. 14 00:00:49,570 --> 00:00:58,080 OK, now, by the way, we can install and map for Windows or for Mac or for Ubuntu, by the way. 15 00:00:58,770 --> 00:01:07,500 But actually for you as ethical hacker, it's better to have Kelly Linux because Carilion is an operating 16 00:01:07,500 --> 00:01:09,660 system used for ventilation systems. 17 00:01:09,660 --> 00:01:10,670 And if you can hack us. 18 00:01:10,990 --> 00:01:15,010 OK, so yeah, it is better to have Kelly installed. 19 00:01:15,090 --> 00:01:21,690 So from here you can go to that Linux download and from here I want to choose a life lifeboat, just 20 00:01:21,690 --> 00:01:22,130 this one. 21 00:01:22,350 --> 00:01:26,470 And here you can download it, which is three point seven gigabytes, which is called Linux. 22 00:01:26,640 --> 00:01:27,730 Twenty twenty one. 23 00:01:28,080 --> 00:01:28,470 OK. 24 00:01:28,500 --> 00:01:29,190 Oh, torrent. 25 00:01:29,190 --> 00:01:29,700 Torrent. 26 00:01:29,700 --> 00:01:35,840 And do you have some just in case to make sure that you have the right distribution of that. 27 00:01:35,880 --> 00:01:36,560 iSuppli. 28 00:01:37,470 --> 00:01:37,910 OK. 29 00:01:39,110 --> 00:01:43,880 Now, the second thing or the third thing, the second we want to have. 30 00:01:44,780 --> 00:01:47,540 And environment to test the unmap on. 31 00:01:47,570 --> 00:01:52,200 So we want to scan the board, the host vulnerability and so on. 32 00:01:52,220 --> 00:02:00,890 So actually it's better to have a local machine or a testing machine for that purpose, not to test 33 00:02:00,890 --> 00:02:04,430 on targets like Google or Amazon or whatever. 34 00:02:04,610 --> 00:02:08,660 No, actually, this is a bed, so we would have meters out of it. 35 00:02:09,590 --> 00:02:14,930 OK, so from here, meet this floatable, you can download it from Salt-Water or you can have it from 36 00:02:14,970 --> 00:02:16,370 around seven, which is this one. 37 00:02:17,350 --> 00:02:24,520 OK, but of course, you need to provide information, an email the company are working with, you can, 38 00:02:24,520 --> 00:02:26,170 but ultimately that is, by the way. 39 00:02:26,310 --> 00:02:26,740 OK. 40 00:02:27,770 --> 00:02:31,010 So you don't need to register and all of this. 41 00:02:31,090 --> 00:02:35,780 OK, now after virtual books is downloaded and installed. 42 00:02:36,690 --> 00:02:40,500 Now we want to have Candy Linux operating system. 43 00:02:40,830 --> 00:02:47,610 Now, you may ask me, but why we need to get in because by default, it has the unmap already there. 44 00:02:47,850 --> 00:02:51,600 OK, and by the way, again, we are as an ethical hackers. 45 00:02:51,660 --> 00:02:57,990 We have to learn the right way, which is using Linux, because this is used mainly by, if you can, 46 00:02:57,990 --> 00:03:01,120 hackers or hackers generally. 47 00:03:02,040 --> 00:03:07,770 So from here on the virtual books new and let's name it Kelly or Kleenex. 48 00:03:09,050 --> 00:03:12,950 And here you can choose Linux and its choose other 64. 49 00:03:12,980 --> 00:03:21,200 OK, and you can do next, but as much as you want, by the way, 512 megabytes will be enough. 50 00:03:21,450 --> 00:03:27,370 But in my case, I have a lot of ram on my laptop so I can work together. 51 00:03:28,400 --> 00:03:31,460 And here you can create a hard disk. 52 00:03:31,670 --> 00:03:32,680 Next, next, next. 53 00:03:33,200 --> 00:03:37,190 In my case, I will put it as 50 gigabyte or no. 54 00:03:37,190 --> 00:03:40,150 Actually, it's better to have it as 20 now. 55 00:03:40,160 --> 00:03:43,970 It depends on your hardware, again, because I have a lot. 56 00:03:45,310 --> 00:03:48,160 OK, now this is the first step now here. 57 00:03:48,280 --> 00:03:51,730 Let's go to the sitting while I'm choosing callisthenics. 58 00:03:52,280 --> 00:03:58,390 Let's go to that one, make sure it is a bridge adapter and make sure you are using that adapter. 59 00:03:58,390 --> 00:03:59,230 Do what you want. 60 00:03:59,530 --> 00:04:05,500 In my case, and this is the Wi-Fi, not the Internet, and then go to the storage. 61 00:04:05,860 --> 00:04:11,070 So here, too, is the empty and choose the disk, find and choose Candlemas. 62 00:04:11,170 --> 00:04:12,280 OK, which is this one. 63 00:04:12,610 --> 00:04:13,290 And Briss. 64 00:04:13,300 --> 00:04:17,320 OK, now after this is done, let's click on start. 65 00:04:21,100 --> 00:04:27,820 And as you can see, it will select we want to select the Calvinist 2021, which is this one. 66 00:04:30,380 --> 00:04:31,280 And it's not. 67 00:04:34,560 --> 00:04:38,130 And here in my case, I want I can go to. 68 00:04:39,420 --> 00:04:44,070 You can just turn it as light or you can just start the installer, which is this one. 69 00:04:45,730 --> 00:04:53,170 I would choose English, continue United States, continue now for the hostname to scary or whatever 70 00:04:53,170 --> 00:04:55,390 you want to my name, leave it as a.. 71 00:04:57,940 --> 00:05:02,640 Are full name for the new user, because by default, Carrie doesn't support the rule by default. 72 00:05:03,310 --> 00:05:05,250 So you need to put a user here. 73 00:05:05,530 --> 00:05:07,000 So in my case, I can. 74 00:05:07,000 --> 00:05:07,840 But, Kelly. 75 00:05:11,180 --> 00:05:14,270 Username for your account, Kelly, it will be. 76 00:05:15,410 --> 00:05:20,080 And it will be can they can one, two, three, four, five, six. 77 00:05:20,120 --> 00:05:23,850 Now I know it's simple, just this is for the sake of this course. 78 00:05:24,900 --> 00:05:25,280 OK. 79 00:05:26,570 --> 00:05:27,770 This is the password. 80 00:05:30,030 --> 00:05:33,450 By the way, you need to provide secure password. 81 00:05:33,660 --> 00:05:36,750 This is just arbitrary password for the SEC for discourse. 82 00:05:38,410 --> 00:05:46,540 OK, now, if you got stuck on the configure the network, but make sure that you have the at first 83 00:05:47,020 --> 00:05:53,680 from here, from the sitting determinates back to the net, then after it is done, you can return it 84 00:05:53,680 --> 00:05:54,370 back to the bridge. 85 00:05:54,550 --> 00:05:59,260 Now, why we need the bridge, not the net, because we want to be on the same network. 86 00:05:59,810 --> 00:06:09,160 OK, so the clinics would be will have an IP address on the same network of that MLO machine, which 87 00:06:09,160 --> 00:06:12,040 is that we want to use for testing. 88 00:06:12,230 --> 00:06:14,830 OK, don't worry, we'll handle that right away. 89 00:06:15,550 --> 00:06:16,150 Continue. 90 00:06:16,240 --> 00:06:16,870 Continue. 91 00:06:17,810 --> 00:06:24,620 And you can choose either a cigarette or or, you know, in our case, it doesn't matter. 92 00:06:24,740 --> 00:06:25,430 So continue. 93 00:06:26,370 --> 00:06:29,670 And finish just and, yes, continue. 94 00:06:30,840 --> 00:06:35,630 OK, now you will see you see this news and talk more and could choose, yes, continue. 95 00:06:36,110 --> 00:06:36,720 Continue. 96 00:06:37,320 --> 00:06:39,890 Now you will see that Instagram bootloader. 97 00:06:39,900 --> 00:06:40,440 Yes. 98 00:06:41,460 --> 00:06:46,190 And you can choose this device, which is the main device. 99 00:06:47,110 --> 00:06:48,760 Which is our main device continuo. 100 00:06:50,910 --> 00:06:55,170 Now the installation is complete, now let's select the first one. 101 00:06:55,640 --> 00:07:00,870 Here's what the user that we created previously, Kelly, and the rest is Kelly. 102 00:07:00,900 --> 00:07:02,190 One, two, three, four, five, six. 103 00:07:03,600 --> 00:07:05,650 Now we have the calendar is ready. 104 00:07:05,680 --> 00:07:08,330 So from here, let's go to the full screen. 105 00:07:09,520 --> 00:07:13,630 Yeah, I think this is better from here if I click on it. 106 00:07:14,690 --> 00:07:20,690 So if I can take you can see that this is the IP address, which is inside the network. 107 00:07:20,750 --> 00:07:23,540 So from here, from the machine sitting. 108 00:07:25,700 --> 00:07:33,650 To the network and select bridge adatto this, OK, if I type, I have config again, you can notice 109 00:07:33,650 --> 00:07:36,150 that it is still the same problem. 110 00:07:36,650 --> 00:07:39,110 So for for that I have config. 111 00:07:40,480 --> 00:07:43,270 Down to the eight zero. 112 00:07:45,060 --> 00:07:48,570 Or actually, it's at zero down. 113 00:07:49,870 --> 00:07:55,540 And of course, you need Asuda permission so to do this and Candy, one, two, three, four, five, 114 00:07:55,540 --> 00:07:55,930 six. 115 00:07:56,960 --> 00:08:00,590 So you can notice that if I type, I have config again. 116 00:08:01,690 --> 00:08:04,350 For this, you can see that the work is done. 117 00:08:05,530 --> 00:08:08,280 So you're not stuck here, so again. 118 00:08:09,370 --> 00:08:11,500 So do I have config? 119 00:08:11,690 --> 00:08:13,990 I actually think I must, yeah. 120 00:08:13,990 --> 00:08:15,880 I think it's better to increase the point size. 121 00:08:16,030 --> 00:08:20,280 So do I have config at zero up like that. 122 00:08:20,950 --> 00:08:21,300 So. 123 00:08:22,350 --> 00:08:23,540 So do I have config. 124 00:08:23,560 --> 00:08:30,340 You can see that now we have the IP address, which is this one which is inside the network and this 125 00:08:30,340 --> 00:08:31,110 is what we want. 126 00:08:31,390 --> 00:08:34,250 By the way, you can see that and map is here right. 127 00:08:34,450 --> 00:08:36,280 As you can see and map is here. 128 00:08:36,850 --> 00:08:44,410 And by the way, if you wouldn't like that opacity like this just from here, from that file, the preferences 129 00:08:44,680 --> 00:08:51,360 from the cat here, from here, from the application, transparency, but to zero and apply. 130 00:08:51,730 --> 00:08:55,780 You can see that now there are no transparency at all and you can change. 131 00:08:56,650 --> 00:08:58,450 And by the way, you can change the. 132 00:08:59,940 --> 00:09:08,880 So from here, green on black, if you like this, actually, I prefer this because it is it's not just 133 00:09:08,880 --> 00:09:11,110 like I am talking, I am HÃ¥kon or something. 134 00:09:11,130 --> 00:09:13,660 No, no, the field is not like that. 135 00:09:13,680 --> 00:09:16,870 No, actually, it's better for your lives or at least for my eyes. 136 00:09:16,890 --> 00:09:17,750 I think this is better. 137 00:09:18,790 --> 00:09:27,220 Unfortunately for my pocket now, the next step, we want to prepare the environment, we want to download 138 00:09:27,220 --> 00:09:34,960 and install the MLO or we already download it, so we want to install it so we can test and map against 139 00:09:34,960 --> 00:09:36,300 it in the next Lichter's. 140 00:09:36,730 --> 00:09:43,090 OK, now, after we prepare the clinics, we want to prevent the meters, which is the machine that 141 00:09:43,090 --> 00:09:52,100 we want to run the inmate against to test what scans vulnerability, skip discovery and all of that. 142 00:09:52,570 --> 00:09:59,650 So from the MLO, make sure you are downloaded the mitzvot to bit to OK, which is you already download 143 00:09:59,650 --> 00:10:03,900 it now from here and you name anything. 144 00:10:03,910 --> 00:10:07,270 So its name ATM Exploit on its floatable. 145 00:10:08,710 --> 00:10:09,040 To. 146 00:10:10,340 --> 00:10:13,790 And to Lennox, it was other Linux 64. 147 00:10:15,140 --> 00:10:17,090 Five hundred and twelve megabytes will be enough. 148 00:10:18,040 --> 00:10:19,500 Be it next, next. 149 00:10:19,530 --> 00:10:26,310 Yes, Edgar is enough or more than enough, actually, now click on the sitting for this machine, make 150 00:10:26,310 --> 00:10:29,750 sure it is a bridge adapter and from the storage here. 151 00:10:30,180 --> 00:10:34,670 So actually, we want to remove this and we add we want to add a new harvest. 152 00:10:34,680 --> 00:10:36,750 So from here, add it at. 153 00:10:37,410 --> 00:10:38,380 So let's choose it. 154 00:10:38,400 --> 00:10:38,730 Yeah. 155 00:10:38,730 --> 00:10:41,910 That the Medicare fine here too is it. 156 00:10:42,120 --> 00:10:43,110 And connections. 157 00:10:43,680 --> 00:10:47,430 So you can see that we only have this one and empty. 158 00:10:47,460 --> 00:10:49,970 So we have this one as a primary device. 159 00:10:50,010 --> 00:10:53,670 You click OK and just start it as simple as that. 160 00:10:56,620 --> 00:11:01,840 Now, after it is booted, you can see that it is only Seattleite command nine or a 10 minute and it 161 00:11:01,840 --> 00:11:04,760 will be asked for an open username and password. 162 00:11:04,900 --> 00:11:11,070 By the way, you can find them on the same rabit seven, which is the MSF admin, which is this one. 163 00:11:11,560 --> 00:11:21,570 So if I go here, MSF admin and again MSF admin, you can see that now we are logged in as MSF admin 164 00:11:21,580 --> 00:11:26,790 and if you I have config, you can see that here we are inside the same network. 165 00:11:27,810 --> 00:11:30,230 Which is what we want now here. 166 00:11:30,670 --> 00:11:34,190 The environment is ready now we have the virtual books inside it. 167 00:11:34,200 --> 00:11:41,400 We have clinics, the attacking machine or the the machine that test and map that we want to run the 168 00:11:41,400 --> 00:11:45,140 scanning techniques and don't of that, we would hand it right away in the next years. 169 00:11:45,420 --> 00:11:53,700 And we have that this machine or that fact machines that we want to run and map against it to test scan 170 00:11:54,330 --> 00:11:56,820 the vulnerability of discovery and all of that. 171 00:11:57,150 --> 00:12:04,680 So you will not run that on alive machines, on life targets, which is bad practice or bad thing. 172 00:12:04,950 --> 00:12:06,010 You may get in trouble. 173 00:12:06,840 --> 00:12:07,230 OK. 174 00:12:08,410 --> 00:12:09,170 Thanks for watching. 175 00:12:09,190 --> 00:12:10,390 I will see you in the next lecture. 176 00:12:10,700 --> 00:12:13,450 We will start handling the unmap --.