1 00:00:02,160 --> 00:00:09,200 OK so after install on Kalli Linux We're going to proceed to install and the second machine in our lab. 2 00:00:09,420 --> 00:00:15,640 So the second machine is going to be meter's floatable with us floatable is another Kallie is another 3 00:00:15,660 --> 00:00:21,630 Linux machine you can think of it as the opposite to Cali so Cali is designed so that you can use it 4 00:00:21,630 --> 00:00:23,880 to hack into other devices. 5 00:00:24,360 --> 00:00:27,780 Mr. SLATER Well it's designed so that you hack into it. 6 00:00:27,780 --> 00:00:31,050 So it's designed for people who want to learn penetration testing. 7 00:00:31,120 --> 00:00:38,820 It is designed so that it has a number of vulnerabilities and we're going to try to use Linux in order 8 00:00:38,820 --> 00:00:41,730 to hack into us floatable. 9 00:00:41,900 --> 00:00:44,390 You can download this from the following link. 10 00:00:44,480 --> 00:00:47,830 You will end up with a zip file like this one. 11 00:00:48,110 --> 00:00:50,990 So sorry not this one like this one. 12 00:00:50,990 --> 00:00:54,420 So once you uncompress it you'll get this directory. 13 00:00:54,620 --> 00:00:58,660 Double click it and you'll see the following files. 14 00:00:58,670 --> 00:01:02,310 So again you create a new machine here in virtual machine. 15 00:01:02,380 --> 00:01:09,180 I'm going to call let me just point about and this is going to be a Linux machine. 16 00:01:13,330 --> 00:01:19,050 And I'm going to continue along again to give it a gigabyte of RAM should be enough. 17 00:01:22,010 --> 00:01:27,200 And then I'm going to use remember with calisthenics we created a new virtual hard disk. 18 00:01:27,350 --> 00:01:30,100 With this we're going to use an existing one. 19 00:01:30,110 --> 00:01:37,040 The reason for that is because the image that we have right now is actually it's designed for VM Ware 20 00:01:37,040 --> 00:01:37,640 player. 21 00:01:37,940 --> 00:01:44,150 So we're going to do is we're going to import the hard the hard disk file or the hard disk image in 22 00:01:44,150 --> 00:01:49,760 here so that we're going to have an ready installation without having to install it the way we installed 23 00:01:49,880 --> 00:01:50,830 clinics. 24 00:01:50,840 --> 00:01:57,200 So we're just going to use an existing virtual hard disk file and I'm just going to navigate select 25 00:01:57,200 --> 00:02:01,070 where it is I'm going to go into the middle portable directory. 26 00:02:01,230 --> 00:02:05,940 And I'm going to select that don't be MBK file. 27 00:02:05,940 --> 00:02:10,030 So it's this file right here I'm going to click on open 28 00:02:12,710 --> 00:02:15,640 and create. 29 00:02:15,690 --> 00:02:18,210 So we're going to start this machine right now. 30 00:02:20,970 --> 00:02:21,330 OK. 31 00:02:21,350 --> 00:02:24,000 So the machine has runouts completely installed. 32 00:02:24,020 --> 00:02:26,080 As I said you don't really need to install anything. 33 00:02:26,090 --> 00:02:29,370 We just imported a ready installation already hard disk. 34 00:02:29,510 --> 00:02:40,860 So it's asking me for the username and the username is as admin and the password is the same so it's 35 00:02:40,860 --> 00:02:42,610 MSF admin as well. 36 00:02:43,830 --> 00:02:45,960 And as we can see now we logged in. 37 00:02:45,990 --> 00:02:50,630 Now this is only this machine already has a terminal as you can see right now. 38 00:02:51,850 --> 00:02:57,680 And it's giving you a warning that you should never expose this machine to external internet connection 39 00:02:57,680 --> 00:02:59,660 because it is a very noble machine. 40 00:02:59,660 --> 00:03:01,340 It is designed to be burnable. 41 00:03:01,370 --> 00:03:06,740 Now right now it's only inside our lab it's only installed as a virtual machine. 42 00:03:06,740 --> 00:03:09,740 So literally nobody outside our lab can access it. 43 00:03:09,830 --> 00:03:12,880 So this is a really good way of using it. 44 00:03:13,040 --> 00:03:18,380 Now this is if the machine is installed as I said in the future we're going to talk about how we're 45 00:03:18,380 --> 00:03:20,900 going to try and hack into this machine again. 46 00:03:20,900 --> 00:03:22,670 Don't be intimidated by the terminal. 47 00:03:22,760 --> 00:03:27,520 We're going to be using it a lot and we're going to learn how to use it step by step. 48 00:03:27,530 --> 00:03:32,600 So at the moment just we have this installed and we're going to move on to the next step and we will 49 00:03:32,600 --> 00:03:36,050 talk about this once we actually need to use it in the future. 50 00:03:36,050 --> 00:03:39,470 So if you want to turn off this machine all you have to do is just type in power of 51 00:03:42,820 --> 00:03:47,630 data into and so you that you need to be rude. 52 00:03:47,650 --> 00:03:50,700 So again I'll talk about this later for now. 53 00:03:50,700 --> 00:03:51,690 So you do power of 54 00:03:54,910 --> 00:04:00,730 so just run the command like this and asking you for the admin password. 55 00:04:05,060 --> 00:04:06,680 And that's it it's going off now. 56 00:04:08,300 --> 00:04:09,040 And here we go. 57 00:04:09,040 --> 00:04:09,760 The machine is off.