Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,540 --> 00:00:04,500
As I mentioned, this course is going to be highly practical.
2
00:00:04,830 --> 00:00:11,820
Therefore, you will need a lab, a place where you can practice and experiment with the things that
3
00:00:11,820 --> 00:00:14,130
you're going to learn in the course.
4
00:00:14,910 --> 00:00:20,220
Not only that, but having a lab is essential for hackers or pen testers.
5
00:00:20,220 --> 00:00:26,520
Because let's say you discovered a new attack or you want to experiment with a new attack, or you learn
6
00:00:26,520 --> 00:00:28,970
something new online and you want to test it.
7
00:00:28,980 --> 00:00:35,790
Then the perfect place for you to test this and practice hacking is a hacking or a testing lab.
8
00:00:36,750 --> 00:00:42,720
Now to create a lab, you just need a number of computers with different operating systems, and you
9
00:00:42,720 --> 00:00:44,430
will need a number of networks.
10
00:00:44,430 --> 00:00:50,070
If you are testing network attacks and if you are testing website attacks, then you will need to install
11
00:00:50,070 --> 00:00:52,110
websites on these computers.
12
00:00:52,560 --> 00:01:00,990
Or you can do all of this inside your computer, inside one machine, and install everything else as
13
00:01:00,990 --> 00:01:02,430
virtual machines.
14
00:01:02,610 --> 00:01:04,739
And this is what we're going to do.
15
00:01:04,920 --> 00:01:07,680
So let's say you have your computer right here.
16
00:01:07,680 --> 00:01:13,980
This is your main computer that you use every day to check your emails or even to watch this course.
17
00:01:14,670 --> 00:01:18,570
This computer might be running Windows, OSX or Linux.
18
00:01:18,570 --> 00:01:19,740
It doesn't really matter.
19
00:01:19,740 --> 00:01:21,660
It can run any operating system.
20
00:01:21,660 --> 00:01:30,660
You can keep all the programs that you love and like and install a virtualization software such as VirtualBox
21
00:01:30,660 --> 00:01:31,890
or VMware.
22
00:01:32,010 --> 00:01:40,830
A virtualization software allow us to create a number of virtual computers inside your main computer
23
00:01:40,830 --> 00:01:49,680
so we can have three or four or five or ten computers all installed inside your main operating system.
24
00:01:49,680 --> 00:01:51,570
Inside your main computer.
25
00:01:52,680 --> 00:01:57,120
The really cool thing about this is you will not need a number of computers.
26
00:01:57,120 --> 00:02:00,990
You can do everything inside a single computer.
27
00:02:01,940 --> 00:02:05,700
So what we're going to do is we're going to have a hacking machine.
28
00:02:05,720 --> 00:02:11,280
This is going to be the machine that we will use in order to hack into other machines.
29
00:02:11,300 --> 00:02:16,520
We're going to install Linux on it and we'll talk about what that is later on.
30
00:02:17,300 --> 00:02:20,410
And we're going to have to target machines.
31
00:02:20,420 --> 00:02:25,820
These are machines that we're going to try to hack into and practice hacking against.
32
00:02:26,360 --> 00:02:32,060
One of them is going to be running windows and the other one is going to be running an operating system
33
00:02:32,060 --> 00:02:33,530
called Metasploit Table.
34
00:02:33,530 --> 00:02:36,170
And we will talk about that once we get to it.
35
00:02:37,470 --> 00:02:44,880
Now it is very important to understand that you will not lose any functionality when you install an
36
00:02:44,880 --> 00:02:52,470
operating system as a virtual machine, you can use that machine exactly as if it's a real physical
37
00:02:52,470 --> 00:02:53,250
machine.
38
00:02:54,090 --> 00:02:59,640
So the really cool thing about using virtual machines, first of all, you're not going to lose any
39
00:02:59,640 --> 00:03:00,840
functionality.
40
00:03:00,900 --> 00:03:04,570
Second, all the machines are going to be isolated.
41
00:03:04,590 --> 00:03:10,350
So as we go through the course, we're going to be trying to hack into these machines and we might actually
42
00:03:10,350 --> 00:03:13,050
break one of them, but that's fine.
43
00:03:13,050 --> 00:03:15,300
It will not affect your host machine.
44
00:03:15,300 --> 00:03:22,530
You will be able to easily fix this and go back to a snapshot of when the machine was working without
45
00:03:22,530 --> 00:03:24,900
affecting your main computer.
46
00:03:25,800 --> 00:03:31,050
The other cool thing is that you'll be able to have a number of different versions of each of these
47
00:03:31,050 --> 00:03:37,860
machines, and you'll be able to change the configuration easily, change the network settings, or
48
00:03:37,860 --> 00:03:42,420
switch between different states of these machines and so on.
49
00:03:43,080 --> 00:03:51,240
So by using virtualization, you will not lose any functionality, but you will gain so many cool features.
50
00:03:51,990 --> 00:03:55,830
And the main thing to keep in mind is your host machine.
51
00:03:55,830 --> 00:03:58,620
Your main computer will never be affected.
52
00:03:58,620 --> 00:04:00,480
It's completely isolated.
53
00:04:00,630 --> 00:04:08,040
And if we break any of these machines, nothing will happen to your precious computer that you use every
54
00:04:08,040 --> 00:04:08,610
day.
55
00:04:08,790 --> 00:04:14,220
And this way you can always use your host machine for daily use, for checking emails, watching the
56
00:04:14,220 --> 00:04:20,850
videos, doing whatever you do normally, and then use your virtual machines for hacking and practicing
57
00:04:20,850 --> 00:04:21,750
the attacks.
58
00:04:22,500 --> 00:04:25,560
And this is what we're going to be doing in this course.
59
00:04:25,560 --> 00:04:31,320
So right here I have a Windows computer that does not contain any hacking tools.
60
00:04:31,320 --> 00:04:38,790
So I can't really use it for hacking, but I have a virtualization software called VMware installed
61
00:04:38,790 --> 00:04:48,060
on it, and this software allows me to run multiple operating systems as virtual machines within this
62
00:04:48,060 --> 00:04:49,560
host computer.
63
00:04:49,920 --> 00:04:57,030
So I can use the host computer for my data use and then use the virtual machines for whatever use I
64
00:04:57,030 --> 00:04:59,220
want for testing or for hacking.
65
00:04:59,670 --> 00:05:04,980
So if I zoom in here on the left, you can see that I have Linux installed.
66
00:05:04,980 --> 00:05:08,070
This is an operating system that we will use for hacking.
67
00:05:08,070 --> 00:05:10,620
You can see I have another Windows computer.
68
00:05:10,620 --> 00:05:14,880
You can see that I have Linux, all of it installed as virtual machines.
69
00:05:14,880 --> 00:05:20,850
And then we're going to be using these as we go through the course for hacking or for testing without
70
00:05:20,850 --> 00:05:25,980
affecting our main host operating system, this Windows Computer.
71
00:05:26,910 --> 00:05:29,400
Now, don't worry about any of this.
72
00:05:29,400 --> 00:05:36,330
In the next lectures, I will show you in details how to install this virtualization software, VMware
73
00:05:36,330 --> 00:05:43,230
on all of the major operating systems on Windows, Linux or Apple Mac OS.
74
00:05:43,890 --> 00:05:50,790
As we go through the course, I will also show you in details how to install these operating systems
75
00:05:50,790 --> 00:05:53,790
as virtual machines within VMware.
7800
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.