All language subtitles for 3. Installing Metasploitable As a Virtual Machine

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,160 --> 00:00:09,200 OK so after install on Kalli Linux We're going to proceed to install and the second machine in our lab. 2 00:00:09,420 --> 00:00:15,640 So the second machine is going to be meter's floatable with us floatable is another Kallie is another 3 00:00:15,660 --> 00:00:21,630 Linux machine you can think of it as the opposite to Cali so Cali is designed so that you can use it 4 00:00:21,630 --> 00:00:23,880 to hack into other devices. 5 00:00:24,360 --> 00:00:27,780 Mr. SLATER Well it's designed so that you hack into it. 6 00:00:27,780 --> 00:00:31,050 So it's designed for people who want to learn penetration testing. 7 00:00:31,120 --> 00:00:38,820 It is designed so that it has a number of vulnerabilities and we're going to try to use Linux in order 8 00:00:38,820 --> 00:00:41,730 to hack into us floatable. 9 00:00:41,900 --> 00:00:44,390 You can download this from the following link. 10 00:00:44,480 --> 00:00:47,830 You will end up with a zip file like this one. 11 00:00:48,110 --> 00:00:50,990 So sorry not this one like this one. 12 00:00:50,990 --> 00:00:54,420 So once you uncompress it you'll get this directory. 13 00:00:54,620 --> 00:00:58,660 Double click it and you'll see the following files. 14 00:00:58,670 --> 00:01:02,310 So again you create a new machine here in virtual machine. 15 00:01:02,380 --> 00:01:09,180 I'm going to call let me just point about and this is going to be a Linux machine. 16 00:01:13,330 --> 00:01:19,050 And I'm going to continue along again to give it a gigabyte of RAM should be enough. 17 00:01:22,010 --> 00:01:27,200 And then I'm going to use remember with calisthenics we created a new virtual hard disk. 18 00:01:27,350 --> 00:01:30,100 With this we're going to use an existing one. 19 00:01:30,110 --> 00:01:37,040 The reason for that is because the image that we have right now is actually it's designed for VM Ware 20 00:01:37,040 --> 00:01:37,640 player. 21 00:01:37,940 --> 00:01:44,150 So we're going to do is we're going to import the hard the hard disk file or the hard disk image in 22 00:01:44,150 --> 00:01:49,760 here so that we're going to have an ready installation without having to install it the way we installed 23 00:01:49,880 --> 00:01:50,830 clinics. 24 00:01:50,840 --> 00:01:57,200 So we're just going to use an existing virtual hard disk file and I'm just going to navigate select 25 00:01:57,200 --> 00:02:01,070 where it is I'm going to go into the middle portable directory. 26 00:02:01,230 --> 00:02:05,940 And I'm going to select that don't be MBK file. 27 00:02:05,940 --> 00:02:10,030 So it's this file right here I'm going to click on open 28 00:02:12,710 --> 00:02:15,640 and create. 29 00:02:15,690 --> 00:02:18,210 So we're going to start this machine right now. 30 00:02:20,970 --> 00:02:21,330 OK. 31 00:02:21,350 --> 00:02:24,000 So the machine has runouts completely installed. 32 00:02:24,020 --> 00:02:26,080 As I said you don't really need to install anything. 33 00:02:26,090 --> 00:02:29,370 We just imported a ready installation already hard disk. 34 00:02:29,510 --> 00:02:40,860 So it's asking me for the username and the username is as admin and the password is the same so it's 35 00:02:40,860 --> 00:02:42,610 MSF admin as well. 36 00:02:43,830 --> 00:02:45,960 And as we can see now we logged in. 37 00:02:45,990 --> 00:02:50,630 Now this is only this machine already has a terminal as you can see right now. 38 00:02:51,850 --> 00:02:57,680 And it's giving you a warning that you should never expose this machine to external internet connection 39 00:02:57,680 --> 00:02:59,660 because it is a very noble machine. 40 00:02:59,660 --> 00:03:01,340 It is designed to be burnable. 41 00:03:01,370 --> 00:03:06,740 Now right now it's only inside our lab it's only installed as a virtual machine. 42 00:03:06,740 --> 00:03:09,740 So literally nobody outside our lab can access it. 43 00:03:09,830 --> 00:03:12,880 So this is a really good way of using it. 44 00:03:13,040 --> 00:03:18,380 Now this is if the machine is installed as I said in the future we're going to talk about how we're 45 00:03:18,380 --> 00:03:20,900 going to try and hack into this machine again. 46 00:03:20,900 --> 00:03:22,670 Don't be intimidated by the terminal. 47 00:03:22,760 --> 00:03:27,520 We're going to be using it a lot and we're going to learn how to use it step by step. 48 00:03:27,530 --> 00:03:32,600 So at the moment just we have this installed and we're going to move on to the next step and we will 49 00:03:32,600 --> 00:03:36,050 talk about this once we actually need to use it in the future. 50 00:03:36,050 --> 00:03:39,470 So if you want to turn off this machine all you have to do is just type in power of 51 00:03:42,820 --> 00:03:47,630 data into and so you that you need to be rude. 52 00:03:47,650 --> 00:03:50,700 So again I'll talk about this later for now. 53 00:03:50,700 --> 00:03:51,690 So you do power of 54 00:03:54,910 --> 00:04:00,730 so just run the command like this and asking you for the admin password. 55 00:04:05,060 --> 00:04:06,680 And that's it it's going off now. 56 00:04:08,300 --> 00:04:09,040 And here we go. 57 00:04:09,040 --> 00:04:09,760 The machine is off. 5509

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.