1 00:00:00,940 --> 00:00:07,600 Remember I told you that we must have vulnerable machines that we can scan and before we actually proceed 2 00:00:07,840 --> 00:00:11,240 to performing, scanning and covering different tools that people use. 3 00:00:11,650 --> 00:00:16,870 Let us first see where we can get a vulnerable machine and how we can install it. 4 00:00:18,060 --> 00:00:24,420 And trust me, it is pretty easy, so just type top10 vulnerable machines and you will see this rapid 5 00:00:24,420 --> 00:00:28,670 seven link that says 10 places to find vulnerable machines for your lap. 6 00:00:29,340 --> 00:00:30,270 Click on that link. 7 00:00:31,160 --> 00:00:38,090 And down here, if I scroll all the way down, I should see a list of 10 different vulnerable machines 8 00:00:38,360 --> 00:00:41,240 that we can use as a hacker to practice our skills. 9 00:00:42,290 --> 00:00:48,950 And for this action, we're going to be going with the first one, so the name of it is metastable, 10 00:00:49,580 --> 00:00:55,910 click on it and it will route you to another page of Rapid Seven website, and it will tell you Matus 11 00:00:55,910 --> 00:00:57,650 political virtual machine to test. 12 00:00:58,670 --> 00:01:04,010 You can read this if you want, as it tells you some of the information about the matters political, 13 00:01:04,850 --> 00:01:10,670 but what's the most important part is down here in order to download this machine, you must fill in 14 00:01:10,670 --> 00:01:11,530 this information. 15 00:01:12,380 --> 00:01:15,590 Now, it is up to you what information you will feel right here. 16 00:01:16,190 --> 00:01:21,050 But as soon as you fill all of this, you can click on submit and it will lead you to a page where you 17 00:01:21,050 --> 00:01:23,990 can download metastable up here. 18 00:01:24,140 --> 00:01:28,930 It tells us that Anticipatable is free to use after we fill out the form. 19 00:01:29,900 --> 00:01:34,070 So this is something that you must do in order to download it from the official website. 20 00:01:35,030 --> 00:01:40,340 And after you finish downloading it, you should finish up with a file that looks something like this 21 00:01:40,670 --> 00:01:47,150 sommat disputable Linux zip you want to extract this, far as you can see, I have already extracted 22 00:01:47,150 --> 00:01:47,330 it. 23 00:01:47,630 --> 00:01:50,480 And you should see these files right here. 24 00:01:51,200 --> 00:01:56,260 This Vindicator file is our hard disk that we are going to use in a virtual machine. 25 00:01:56,750 --> 00:01:58,430 So let's see how we can install it. 26 00:01:59,480 --> 00:02:01,100 Go open up your virtual box. 27 00:02:02,080 --> 00:02:06,700 And we want to be creating a new virtual machine, we already know how to do that. 28 00:02:06,820 --> 00:02:12,850 Click on this button right here and it will ask us for the name of our time machine and the operating 29 00:02:12,850 --> 00:02:13,240 system. 30 00:02:14,160 --> 00:02:21,090 You can name it anything you want to just name it matters political to, and the reason why I'm naming 31 00:02:21,090 --> 00:02:23,640 it to is because I already have it installed right here. 32 00:02:23,640 --> 00:02:25,380 So the names differ. 33 00:02:26,440 --> 00:02:31,900 In the type of operating system you want to select Linux and in the version of operating system, you 34 00:02:31,900 --> 00:02:38,270 want to scroll all the way down and select other Linux 64 bit once you got the settings ready. 35 00:02:38,400 --> 00:02:39,190 Click on next. 36 00:02:39,940 --> 00:02:41,770 And this is what they talked about. 37 00:02:41,890 --> 00:02:46,800 These virtual machines will use very little hardware resources from your physical machine. 38 00:02:47,500 --> 00:02:52,960 That's why for this virtual machine, for them anticipatable, we can leave five hundred and twelve 39 00:02:52,960 --> 00:02:53,830 megabytes of RAM. 40 00:02:54,040 --> 00:02:56,080 It is more than enough for this machine to run. 41 00:02:56,800 --> 00:03:01,600 It will even work if you lower it to two hundred and fifty six megabytes ram. 42 00:03:01,990 --> 00:03:04,210 But five hundred and twelve is recommended. 43 00:03:04,240 --> 00:03:06,400 So let us leave it on five hundred twelve. 44 00:03:06,400 --> 00:03:12,410 And if you don't have this much ram to use you can leave it on two hundred and fifty six, then proceed 45 00:03:12,420 --> 00:03:16,720 to next and in the step instead of creating a virtual hard disk. 46 00:03:16,720 --> 00:03:20,170 Now we want to use an existing virtual hard disk. 47 00:03:21,340 --> 00:03:26,710 Once you select this option, click on this icon right here and click on ADD. 48 00:03:27,740 --> 00:03:30,600 Then find your hard disk forever. 49 00:03:30,620 --> 00:03:35,420 You got to download it, for example, I got it on my desktop right here. 50 00:03:36,110 --> 00:03:36,760 Here it is. 51 00:03:36,770 --> 00:03:42,770 Find this VMT Kaifa, select it and then select it right here on again and click on Choose. 52 00:03:43,770 --> 00:03:51,540 Once you do that, you can click on Create, and this is pretty much it, we got our the created, all 53 00:03:51,540 --> 00:03:53,670 we are left to do right now are two things. 54 00:03:54,340 --> 00:03:56,670 The first thing is navigate the settings. 55 00:03:58,110 --> 00:04:04,500 Go to the network settings and switch from that to bridge adapter, the same thing we did with our Linux 56 00:04:04,500 --> 00:04:07,770 machine, then choose your adapter and click on OK. 57 00:04:08,920 --> 00:04:14,030 This will just make government split about to IP address belonging to the IP range of our network. 58 00:04:14,830 --> 00:04:16,780 Once you do that, click on START. 59 00:04:18,560 --> 00:04:25,790 And this will start the process of installing metal portable for you, unlike in clinics right here, 60 00:04:26,030 --> 00:04:27,890 you don't need to do anything. 61 00:04:28,380 --> 00:04:33,890 This will install machine on its own and it will take about a minute or two, maybe even less. 62 00:04:35,180 --> 00:04:41,420 So at the end, after this finishes, it should prompt us with a login and you will notice that this 63 00:04:41,420 --> 00:04:44,300 machine doesn't have a desktop or anything else. 64 00:04:44,480 --> 00:04:46,030 It is a command line machine. 65 00:04:46,520 --> 00:04:50,000 That means we can only navigate through this machine using commands. 66 00:04:50,570 --> 00:04:53,270 And those commands are simply terminal comments. 67 00:04:53,700 --> 00:04:56,750 So just picture this as one big terminal. 68 00:04:57,470 --> 00:05:02,420 As we can see, the installation has finished and down here we got to split the log in. 69 00:05:02,810 --> 00:05:05,900 And if you read through this website right here. 70 00:05:07,120 --> 00:05:12,910 If you read through this paragraph, it tells us right here that the metastable logging is massive Admon 71 00:05:13,150 --> 00:05:16,100 and the password is also a admin. 72 00:05:16,540 --> 00:05:25,300 So let's try it out, go to our machine type MSF admin and under password, again, MSF admin. 73 00:05:26,170 --> 00:05:27,280 And here we are. 74 00:05:27,940 --> 00:05:34,750 We managed to log in to our room at this point just to check up on network type of config and it will 75 00:05:34,750 --> 00:05:38,390 tell me that my IP addresses wanted to do that 168 at one to three. 76 00:05:39,070 --> 00:05:41,380 That is because we set it to be over breached adapter. 77 00:05:42,330 --> 00:05:50,250 And if we try to ping Google, for example, it will work, so our machine is set up and it is ready 78 00:05:50,250 --> 00:05:51,720 to be scanned and attacked. 79 00:05:52,860 --> 00:05:58,530 You see, this was pretty simple to do, and in the next video, we are ready to start our scanning 80 00:05:58,530 --> 00:05:59,080 process. 81 00:05:59,220 --> 00:05:59,790 See you there.