1 00:00:01,550 --> 00:00:07,580 So in this video, we are going to install a water machine that is called Matus by the Water and then 2 00:00:07,580 --> 00:00:12,430 we will take the matter spottswood to download and you can go to this one happening. 3 00:00:12,800 --> 00:00:19,430 So this model, Citable two, is a vulnerable water machine made by this rapid seven guys. 4 00:00:19,790 --> 00:00:25,740 They also made this tool called Metal Spike, and we will see them at this point in the future videos. 5 00:00:26,000 --> 00:00:31,610 But for now, for a numeration scanning purposes, we don't know this as part of a larger mission, 6 00:00:32,270 --> 00:00:38,240 because I want to show you the final report and we need to get some more information through this. 7 00:00:38,240 --> 00:00:39,690 And let's wait. 8 00:00:39,710 --> 00:00:45,480 Let's just download this virtual machine for now and we will discuss it later. 9 00:00:46,070 --> 00:00:47,720 So click on this. 10 00:00:49,200 --> 00:00:56,280 Click on this link and you will get the default as download, so I'm going to cancel this because I 11 00:00:56,280 --> 00:00:57,900 have already downloaded this one. 12 00:00:58,830 --> 00:01:01,350 So as you can see, this is a different on exaction. 13 00:01:01,360 --> 00:01:08,640 You'll get this further now go into the folder and you can see that this is configuration file and you 14 00:01:08,640 --> 00:01:15,900 can just simply open this remote workstation or you can just open this in the order converter box. 15 00:01:15,910 --> 00:01:18,160 Also, what works the same. 16 00:01:18,870 --> 00:01:20,550 So click on file open. 17 00:01:23,970 --> 00:01:26,010 And look at your mother's battle to. 18 00:01:36,080 --> 00:01:38,960 So we need to edit some automation settings. 19 00:01:44,460 --> 00:01:52,770 So we need to set the alarm for this vital piece of care and process of one person, one vote is enough 20 00:01:52,770 --> 00:02:02,890 and I to we are not downloading in this any files and network adaptor we need to set this to because, 21 00:02:03,300 --> 00:02:08,580 uh, if you said Bridgid only then it will be connected with his network and McCulloch's machine can 22 00:02:09,360 --> 00:02:10,410 ping this computer. 23 00:02:12,010 --> 00:02:12,850 So, so. 24 00:02:13,540 --> 00:02:23,440 And you can do this, too, you can click on this one is enough and click, OK? 25 00:02:26,380 --> 00:02:29,380 So what can you tell us how great this automation? 26 00:02:36,320 --> 00:02:42,260 No further north, no, not on this water mission and click on this, I call it. 27 00:02:44,590 --> 00:02:52,170 And pretty much these basic set for this matters to you to shut up and to ask for a login credentials, 28 00:02:52,360 --> 00:02:58,800 but we do not know the conventions, what we want to do is we need to enumerate and then we'll, uh, 29 00:02:59,380 --> 00:03:03,270 explain this machine and should logging in to this machine. 30 00:03:03,280 --> 00:03:06,040 But we will see them in the future. 31 00:03:06,040 --> 00:03:07,780 Videos and oppression and exploitation. 32 00:03:08,230 --> 00:03:15,520 Uh, but for now, this is all much about this sort of thing, setting up this, uh, widespread. 33 00:03:16,030 --> 00:03:19,150 And, uh, what's your mission as a virtual mission? 34 00:03:19,840 --> 00:03:21,730 So does OK. 35 00:03:21,860 --> 00:03:27,640 They go the logging and just how much of the government uh, but we do not use these credentials to 36 00:03:27,640 --> 00:03:32,860 log in, but we expect our robots that are running on this matter similar to.