1 00:00:01,690 --> 00:00:08,820 Right now that we have Kalli Linux installed let me just show you an overview of the system what Linux 2 00:00:08,950 --> 00:00:16,220 is what's the structure of the file systems are and some of the basic apps that we're going to use. 3 00:00:16,360 --> 00:00:23,470 Now bear with me I know the quality of the college here right now I'm using it in a stretched mode so 4 00:00:23,470 --> 00:00:25,210 it's not proper full screen. 5 00:00:25,210 --> 00:00:29,400 I'm doing that because there is certain programs that we need to install first. 6 00:00:30,130 --> 00:00:35,860 To make it support the full resolution of the screen or off the monitor and go talk about that in the 7 00:00:35,860 --> 00:00:40,310 next lecture because it is it's not advanced Well it's just you need to know some commands. 8 00:00:40,310 --> 00:00:42,040 And I'll walk you through them. 9 00:00:42,040 --> 00:00:46,360 But for now I'd just like to give you an overview of the system. 10 00:00:46,570 --> 00:00:49,240 So as you can see here we just have a status bar. 11 00:00:49,240 --> 00:00:54,150 Very simple the Applications menu can be accessed from here. 12 00:00:54,270 --> 00:01:00,530 So if you click on applications you'll be able to access all the applications that come in preinstalled 13 00:01:00,540 --> 00:01:01,510 with clinics. 14 00:01:01,680 --> 00:01:07,870 And as you can see they are divided into categories in terms of the type of the attack that they get. 15 00:01:07,890 --> 00:01:09,340 They allow you to do so. 16 00:01:09,390 --> 00:01:15,990 We have information gathering vulnerability analysis as well publications and databases exploitation 17 00:01:15,990 --> 00:01:23,970 reverse engineering all types of applications that can be used for penetration testing in the places 18 00:01:23,970 --> 00:01:28,950 here that allows you to access your file systems the files that you'll be using. 19 00:01:29,090 --> 00:01:32,710 It's something similar to my documents in Windows machines. 20 00:01:32,940 --> 00:01:38,640 So as you can see here we click on computers you'll be able to access all the files and the devices 21 00:01:38,730 --> 00:01:45,690 you rarely go hear this and usually access stuff through the home right here or through the roads through 22 00:01:45,690 --> 00:01:48,130 the route because we're the route users. 23 00:01:48,240 --> 00:01:54,870 So it's the same thing if I go to places and then go to home right here and from here you can see that 24 00:01:54,870 --> 00:01:58,660 you can access your desktop your documents download music whatever. 25 00:01:58,680 --> 00:02:07,140 Same way that you have it for Windows or for Mac OS X and you have your trash year where your trash 26 00:02:07,140 --> 00:02:08,070 goes. 27 00:02:08,070 --> 00:02:11,600 This is just a basic file manager bike for word. 28 00:02:11,640 --> 00:02:16,300 And then you can double click a file to run it or double click a directory to open it. 29 00:02:20,600 --> 00:02:26,560 Here we have it again as I said the status bar here you can see the number of desktops or workspaces. 30 00:02:26,630 --> 00:02:33,920 Now Linux usually supports workspaces so you can have different Windows running on different workspaces. 31 00:02:33,920 --> 00:02:39,050 Now at the moment I have no windows running so there's I can't really go to the second word a second 32 00:02:39,440 --> 00:02:40,300 workplace. 33 00:02:40,310 --> 00:02:46,160 Well for example if I had my file manager open here I can go to our next workspace and this is will 34 00:02:46,160 --> 00:02:46,910 be empty. 35 00:02:47,000 --> 00:02:52,340 And then I can I can have something else run in here and have two things or three things that I can 36 00:02:52,340 --> 00:02:59,410 have as many workspaces as I want and it's just easier for you to be switching between them and we'll 37 00:02:59,410 --> 00:03:03,260 be using them when we're doing our penetration testing attacks. 38 00:03:03,400 --> 00:03:07,550 Now here you can have your keyboard if you have more than a keyboard that you want to switch between 39 00:03:07,550 --> 00:03:08,080 them. 40 00:03:08,380 --> 00:03:14,920 You have your networks from here so you can access your wireless your wired networks and your wireless. 41 00:03:14,920 --> 00:03:22,220 Now one thing to note you will not be able to access your internal wireless card through a virtual machine. 42 00:03:22,360 --> 00:03:28,980 So the internal wireless card that you have which is connected to your main machine you will not be 43 00:03:28,980 --> 00:03:31,920 able to access it through your virtual machine. 44 00:03:31,950 --> 00:03:38,670 As you remember we said the settings of this computer to be to be connected through not which means 45 00:03:38,670 --> 00:03:43,770 that it has internet connection but the internet connection is coming from the host machine so it actually 46 00:03:43,770 --> 00:03:53,100 has a virtual into a virtual network set up between this device and my main device which is this device. 47 00:03:53,360 --> 00:04:00,850 So there's a connection between the two devices this device has Internet access because of the Internet 48 00:04:00,880 --> 00:04:03,160 access provided by the main machine 49 00:04:06,210 --> 00:04:12,810 and you can also change your volume from here from the same menu and you can turn off the computer lock 50 00:04:12,810 --> 00:04:15,770 it or enter the preferences from here. 51 00:04:16,840 --> 00:04:22,150 These are just normal preferences you can get yourself familiar with them background's notifications 52 00:04:22,540 --> 00:04:24,140 displays will play with this. 53 00:04:24,160 --> 00:04:29,560 After we fixed the resolution mouse networks all that kind of stuff. 54 00:04:29,980 --> 00:04:35,800 And then you have your Bathory settings and that's it really for the status bar. 55 00:04:35,930 --> 00:04:40,580 So very simple applications and places the most things that will be using. 56 00:04:40,610 --> 00:04:45,890 And then you can access your network settings from here if you had a wireless card connected you'll 57 00:04:45,890 --> 00:04:48,250 be able to see the available networks here. 58 00:04:49,920 --> 00:04:55,240 If you want to connect a wireless card all you have to do is connected so I have a Y A U.S. B wireless 59 00:04:55,240 --> 00:04:58,780 card I'm going to connect it now and I'll show you how it shows up. 60 00:05:00,180 --> 00:05:05,640 So you need to go to this menu right here devices and then go to us. 61 00:05:05,790 --> 00:05:12,960 Now this this procedure is the same regardless of the device that you connect it to us be device whether 62 00:05:12,960 --> 00:05:18,230 it's a wireless device or if it's just a memory stick or any other device. 63 00:05:18,330 --> 00:05:23,560 You go to devices us B and then select the device that you want to connect. 64 00:05:23,580 --> 00:05:28,890 So I connected a wireless card and the chipset that's used in the card is called Atheros. 65 00:05:28,890 --> 00:05:30,600 So this is my wireless card. 66 00:05:30,720 --> 00:05:38,220 I'm going to click it and that should connect it now to my virtual machine to the Callimachi. 67 00:05:38,220 --> 00:05:47,950 So if you go here and gone wireless and then select the network and as you can see I can see the networks 68 00:05:48,280 --> 00:05:55,060 that exist around me I can select any network that I want to connect to and just put the password and 69 00:05:55,090 --> 00:05:59,440 connect to the network normally the way you connect to any other network that you want. 70 00:06:00,440 --> 00:06:02,850 OK so I'm going to disconnect my wireless card now. 71 00:06:08,050 --> 00:06:16,880 Now as you can see now the I don't have a wireless card connected. 72 00:06:16,940 --> 00:06:23,210 What I'd like to know though I still have internet connection because as I said my main machine right 73 00:06:23,210 --> 00:06:31,040 here the the Mac OS X machine is connected to my network and this virtual machine is connected to my 74 00:06:31,040 --> 00:06:35,430 Mac machine via internal virtual network. 75 00:06:35,750 --> 00:06:43,400 So the browser that comes in with Kalya next is this one I'm going to just go to Google to show you 76 00:06:43,400 --> 00:06:44,710 that we have Internet connection 77 00:06:47,830 --> 00:06:50,500 as you can see that we have Internet connection right now. 78 00:06:50,560 --> 00:06:54,630 This is just a normal browser you can use it the same way you use any other browser. 79 00:06:56,770 --> 00:07:00,910 The applications right here are going to talk about them at the moment because we're going to use them 80 00:07:00,910 --> 00:07:04,390 in the future and you'll see what each one of them does. 81 00:07:04,420 --> 00:07:05,260 Once we get to.