All language subtitles for 037 Set up your target-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified) Download
zh-TW Chinese (Traditional) Download
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English Download
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian Download
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala Download
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,380 --> 00:00:02,610 All right you must be itching to get hacking. 2 00:00:02,610 --> 00:00:05,270 So let's get hacking for this section. 3 00:00:05,280 --> 00:00:08,580 We're going to be using a target code methods. 4 00:00:09,390 --> 00:00:15,150 This is a specially designed V.M. that has more holes than a Swiss cheese and we're going to be targeting 5 00:00:15,150 --> 00:00:20,690 this VM using the tools and techniques that we learned in this course and in the previous courses to 6 00:00:20,700 --> 00:00:22,810 hack it in as many ways as possible. 7 00:00:23,560 --> 00:00:28,100 You will be provided with a link to download the VM or you can just Google it that's what matters what 8 00:00:28,150 --> 00:00:32,860 to build to and once you download it here's how you get it started. 9 00:00:32,860 --> 00:00:34,970 I'm going to be using the Amwell here. 10 00:00:35,230 --> 00:00:38,670 You can also use Virtual Box for the purpose of this video. 11 00:00:38,680 --> 00:00:42,310 I'm going to be showing you how to run it on Wii and. 12 00:00:42,550 --> 00:00:45,790 These are the files that I have downloaded and extracted. 13 00:00:45,820 --> 00:00:47,830 You'll see a number of files here. 14 00:00:48,160 --> 00:00:51,740 The one that I want is the file that ends with dot the X.. 15 00:00:51,760 --> 00:00:57,740 All I have to do is to double click on this file and it will automatically load in vi and when. 16 00:00:57,970 --> 00:01:00,520 And as you can see here it's open. 17 00:01:00,550 --> 00:01:03,990 The next thing I do is I click power of this machine on. 18 00:01:04,130 --> 00:01:09,110 You get a small warning sign that says that this virtual machine has been moved or copied. 19 00:01:09,280 --> 00:01:14,750 If you don't know what has happened to it just choose I've copied it and this is what I'm going to choose. 20 00:01:15,600 --> 00:01:16,240 And that's it. 21 00:01:16,260 --> 00:01:18,050 It's as simple as this. 22 00:01:18,110 --> 00:01:22,810 This gets out at the Splitsvilla machine up and running. 23 00:01:22,860 --> 00:01:24,890 I'll be fast forwarding the video here. 24 00:01:25,050 --> 00:01:30,170 Once the machine finishes loading you'll see this beautiful banner that says make us portable too. 25 00:01:30,330 --> 00:01:33,690 And you are presented with a logon prompts. 26 00:01:33,720 --> 00:01:40,350 Now as you can see here there's a warning sign that says never exposed this VM to an untrusted network. 27 00:01:40,740 --> 00:01:45,050 And this is a very fair warning because like I said this is a vulnerable VM. 28 00:01:45,180 --> 00:01:50,100 It is designed to be hacked if you're going to be exposing it to an and trusted network. 29 00:01:50,100 --> 00:01:54,960 For example if you're going to be publishing on the Internet or you're going to be using it at work 30 00:01:55,200 --> 00:01:58,020 then there's a very good chance that it's going to get hacked. 31 00:01:58,020 --> 00:02:03,180 This is why we use it in a virtual environment to keep it contained and to keep it away from prying 32 00:02:03,180 --> 00:02:03,800 eyes. 33 00:02:04,650 --> 00:02:10,630 So now I'm going to switch to my Callimachi and I'm going to assume that I know nothing about my target 34 00:02:10,980 --> 00:02:16,480 and I'm going to start with the very first thing that I need to do which is discover the machines around 35 00:02:16,480 --> 00:02:21,120 me on the network and figure out what the IP address of this time is. 36 00:02:21,250 --> 00:02:25,810 If you remember from the hacking for beginners course one of the essential things that we said we needed 37 00:02:25,810 --> 00:02:28,570 to get hacking is the IP address of the target. 38 00:02:28,570 --> 00:02:31,000 Without that there isn't much we can do. 39 00:02:31,450 --> 00:02:36,760 And the first tool that I'm going to be introducing to here is not discover this is a tool that we use 40 00:02:36,760 --> 00:02:40,210 to discover what hosts are life on a network range. 41 00:02:41,190 --> 00:02:44,490 So I'm just going to run that discovery minus H for help. 42 00:02:44,690 --> 00:02:51,430 And as you can see the minus option here it specifies that age that I want to scan. 43 00:02:51,550 --> 00:02:57,400 So even though this is a completely new tool to you you can now immediately recognize the format of 44 00:02:57,400 --> 00:02:59,110 the tool usage. 45 00:02:59,110 --> 00:03:01,540 It's very similar to previous comments that we've seen. 46 00:03:01,540 --> 00:03:07,660 It's the name of the tool or the name of the program minus age or minus or minus whatever which is the 47 00:03:07,660 --> 00:03:14,060 option that we want to present that to now the question is what is that age that I want to scan. 48 00:03:14,600 --> 00:03:19,820 I'm going to assume that my target is within the same range of my category VM. 49 00:03:19,910 --> 00:03:21,770 So we're both on the same network. 50 00:03:22,670 --> 00:03:28,310 And for me to figure out what the range that I am on is I use one of the commands that we've already 51 00:03:28,310 --> 00:03:36,950 seen which is the I f config and as you can see here my IP address is 1 9 2 1 6 8 1 9 0 1 4 4 which 52 00:03:36,950 --> 00:03:44,810 means that the range that I want to discover is 1 and 2 1 6 8 1 9 0 8 0 all the way to do firefight 53 00:03:46,030 --> 00:03:51,090 so I'm going to introduce this to my net discover tool and I'm going to say net discovered minus our 54 00:03:51,250 --> 00:03:52,010 range. 55 00:03:52,180 --> 00:04:02,920 And then 1 and 2 1 6 8 1 9 0 got 1 4 4 slash 24 slash 24 means stand the entire range from zero to do 56 00:04:02,920 --> 00:04:03,820 by 5. 57 00:04:03,850 --> 00:04:08,870 I could have also said 1 and 2 1 6 8 8 1 9 0 8 0. 58 00:04:08,920 --> 00:04:10,780 As you can see here. 59 00:04:10,840 --> 00:04:15,510 So I made a slight mistake and I put 1 4 by the tool accepted it anyway. 60 00:04:15,600 --> 00:04:21,400 And as you can see here the tool that a very quick scan and it turns the results that are five different 61 00:04:21,400 --> 00:04:30,850 machines on my network got 1 2 1 3 7 8 1 4 5 and 2 5 4. 62 00:04:31,010 --> 00:04:36,190 Given that my Kalli IP address is 1 9 2 1 6 8 1 9 1 4 4. 63 00:04:36,320 --> 00:04:43,670 It is safe to assume that the at the supportable target machine is they got 1 4 5 IP address because 64 00:04:43,670 --> 00:04:48,450 I know that I started my Callimachi first and then I started them at this voidable machine. 65 00:04:48,830 --> 00:04:53,480 And naturally the Amway gave me an IP address which is that dot 1:44. 66 00:04:53,750 --> 00:04:59,000 And then it gave them at the Sweetapple machine the next IP address which is they got one for five. 67 00:04:59,270 --> 00:05:05,810 And as you can see here the tool also tells us the make or the vendor off the machine that I'm targeting. 68 00:05:06,200 --> 00:05:08,070 And here it's highlighted as we M-word. 69 00:05:08,120 --> 00:05:15,080 So I know this is a virtual machine Now obviously I can't cheat a little bit here and I can go and double 70 00:05:15,080 --> 00:05:22,370 check from the prompt we can see that the log in details here are MSF admen MSF admin so I can use those 71 00:05:22,370 --> 00:05:23,910 to log into the machine. 72 00:05:25,090 --> 00:05:27,580 And I can run the command again. 73 00:05:27,610 --> 00:05:33,360 And here we go here's the IP address 1 and 2 1 6 8 1 9 1 4 5. 74 00:05:33,760 --> 00:05:38,770 So to me this is going to be the IP address that I'm going to be targeting the next videos to you. 75 00:05:38,770 --> 00:05:41,620 Obviously it's going to be something different. 76 00:05:41,620 --> 00:05:45,430 So go ahead download them at the spot of the machine and get it up and running. 77 00:05:45,520 --> 00:05:48,790 Figure out what the IP address is and then let's get hacking. 8545

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.