All language subtitles for 019 Understanding where software on Kali Linux comes from-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala Download
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,270 --> 00:00:03,360 Now that you've seen that you might be thinking wow that was too easy. 2 00:00:03,660 --> 00:00:06,540 That's all it takes to install and remove packages of Linux. 3 00:00:06,540 --> 00:00:09,140 I don't even have to go to the Internet and find them. 4 00:00:09,280 --> 00:00:10,840 Just find them for me. 5 00:00:11,280 --> 00:00:11,610 Yes. 6 00:00:11,610 --> 00:00:16,070 Is that something that you might notice wondering but what do these packages come from. 7 00:00:16,260 --> 00:00:21,660 How does candy or anything else for that matter know where to go and look for these packages. 8 00:00:21,880 --> 00:00:28,380 They look in something called depositories and depositories are storage locations from which your software 9 00:00:28,380 --> 00:00:30,960 packages can be retrieved and installed. 10 00:00:31,790 --> 00:00:37,360 So Gadi for example or Debian or anything else for that matter it would have the most storage location 11 00:00:38,590 --> 00:00:46,030 once you issue the ABT get command your Linux box will go into that location try and find the package 12 00:00:46,100 --> 00:00:49,930 and if it does it will download it and install it for you. 13 00:00:50,710 --> 00:00:57,310 However sometimes you try to install the baggage and Kelly can't find it and the default repositories. 14 00:00:57,400 --> 00:01:02,320 So what do you do first let's have a look at what these things look like. 15 00:01:02,320 --> 00:01:05,510 They're usually on the EDC slash AP 16 00:01:10,650 --> 00:01:16,740 and these are the two you are as are the two locations where you can go and find the packages that I 17 00:01:16,740 --> 00:01:18,240 want to install. 18 00:01:18,390 --> 00:01:22,210 You could actually master this using your web browser. 19 00:01:22,260 --> 00:01:24,500 Let's say I want to update my system. 20 00:01:25,180 --> 00:01:32,040 I can do that using the EPG get update. 21 00:01:32,210 --> 00:01:34,900 Now that will take once or just speed things up a bit. 22 00:01:39,480 --> 00:01:44,050 Now ever want to do a full distribution upgrades I can do that. 23 00:01:44,070 --> 00:01:46,140 Apt get upgrade. 24 00:01:52,160 --> 00:01:53,030 See all of that. 25 00:01:53,060 --> 00:02:00,320 These are all software packages that will be upgraded if I continue with these commands. 26 00:02:00,600 --> 00:02:05,870 Is poor exploitation of the compromise Linux host. 27 00:02:05,980 --> 00:02:12,010 Chances are that you won't get non-truth access and you want to find a vulnerability that will give 28 00:02:12,010 --> 00:02:13,900 you access. 29 00:02:13,900 --> 00:02:19,140 This usually involves finding and exploiting vulnerable software. 30 00:02:19,170 --> 00:02:25,860 You might also come across situations where the Linux box you broke into is not connected to the Internet. 31 00:02:25,890 --> 00:02:28,410 Let's say you're unethical engagement for. 32 00:02:28,500 --> 00:02:29,770 I don't know a bank. 33 00:02:29,940 --> 00:02:35,490 They invite you to come in and plug into their internal network as an employee and see if you can hack 34 00:02:35,490 --> 00:02:37,450 anything on that internal network. 35 00:02:37,980 --> 00:02:42,690 You managed to get into a Linux box and you find out that it's not the next to the Internet when you 36 00:02:42,690 --> 00:02:48,420 still want to use it as a stepping stone to try and get to other systems. 37 00:02:49,500 --> 00:02:54,250 To do that you need to install some packages on it but it's not connect to the Internet that's off line. 38 00:02:54,630 --> 00:02:58,770 So what do you do in this case for both situations. 39 00:02:58,950 --> 00:03:04,440 You could use the package commands and this is useful in multiple situations. 40 00:03:04,440 --> 00:03:10,680 Sometimes software cannot be found in depositories Nessus for example if you try to install it using 41 00:03:10,680 --> 00:03:14,660 the ABC get commands you will not be able to find it. 42 00:03:14,760 --> 00:03:20,460 You'll find that on the Nessus website and you'll notice that it ends with a thought that the the the 43 00:03:20,460 --> 00:03:28,530 extension which means that software for Linux Debian unlike FBD However we need to know that the package 44 00:03:28,530 --> 00:03:31,090 does not take care of the penances for us. 45 00:03:31,110 --> 00:03:36,930 So if a package needs and dependencies we'll have to take care of that ourselves to get back to the 46 00:03:36,930 --> 00:03:43,770 Xenogears that we've discussed in our both exploitation to find versions of installed applications and 47 00:03:43,770 --> 00:03:48,580 hope that you are going to want an all out dated vulnerable one. 48 00:03:48,750 --> 00:03:54,980 You can do that using the deep package minus and commands to install the package. 49 00:03:55,140 --> 00:03:57,330 Let's say I want to install Nessus for example. 50 00:03:57,330 --> 00:04:03,080 After downloading it I can do that using the package minus my commands. 51 00:04:03,470 --> 00:04:04,870 And to remove the baggage. 52 00:04:04,920 --> 00:04:09,320 You can do that using the package minus commands. 53 00:04:09,360 --> 00:04:13,280 Now you might be wondering what I just said that the Linux system was off line. 54 00:04:13,320 --> 00:04:18,580 And how am I saying that I can install Nessus after downloading it. 55 00:04:19,110 --> 00:04:24,720 That's going to be for another chapter in another chapter we're going to be learning how to download 56 00:04:24,810 --> 00:04:26,980 stuff on our Candy machine. 57 00:04:27,390 --> 00:04:34,890 And then how we can use our Gadi machine as a server to upload stuff from our galley to the victim machine. 58 00:04:35,510 --> 00:04:41,370 Now let's not worry too much about it let's just assume that you somehow managed to get the Nessus package 59 00:04:41,400 --> 00:04:42,740 on the victim machine. 60 00:04:43,020 --> 00:04:48,240 And you can use that package command to install and remove it. 61 00:04:48,240 --> 00:04:52,470 Now remember these are all situations that happen in ethical hacking engagements. 62 00:04:52,470 --> 00:04:57,330 Having said that and I think that having an agent you want to make sure that you have the permission 63 00:04:57,570 --> 00:05:02,330 to install and remove softer off your clothing on the machine. 64 00:05:02,670 --> 00:05:11,280 So mission for the section on your Gadi machine install files ilah on your Windows machine activate 65 00:05:11,360 --> 00:05:12,370 FTB. 66 00:05:12,450 --> 00:05:13,850 If you don't know how to do that. 67 00:05:13,890 --> 00:05:19,050 We explain that in our hacking for beginners course go there and he knew that section on hacking for 68 00:05:19,050 --> 00:05:24,590 beginners and using structures on those videos activate FTB on your Windows machine. 69 00:05:24,870 --> 00:05:31,180 Then from an open file Zilah and next year is over on Windows. 70 00:05:31,190 --> 00:05:34,650 So I had to upload and download some files. 71 00:05:34,860 --> 00:05:40,400 Then on your candy machine download and install Nessus. 72 00:05:40,620 --> 00:05:43,430 Once you're done we can move onto the next section. 7794

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.