1 00:00:01,660 --> 00:00:06,700 The last machine that we're going to talk about installing today is the Windows machine. 2 00:00:06,700 --> 00:00:14,110 So this is just a normal Windows machine that with Windows than that we will also try to hack into. 3 00:00:14,110 --> 00:00:19,810 So this is going to be another victim another target and we're going to see how we can try and hack 4 00:00:19,840 --> 00:00:21,430 into this victim. 5 00:00:21,430 --> 00:00:26,650 Now again we installed meter's ploy to will be cause me to exploit it will cause a large number of our 6 00:00:26,670 --> 00:00:31,680 inabilities and it can't it's just designed so that you can hack into again. 7 00:00:31,720 --> 00:00:37,600 We've seen that it has a terminal it's not very user friendly and it doesn't really mimic a normal user 8 00:00:38,020 --> 00:00:39,220 for the Windows machine. 9 00:00:39,220 --> 00:00:45,370 This one will be used with scenarios that mimic normal use or that is just using their windows to browse 10 00:00:45,370 --> 00:00:49,510 the Internet or do whatever normal people do with their machines. 11 00:00:49,750 --> 00:00:57,070 So Microsoft has actually released every three versions or free virtual machines of Windows that you 12 00:00:57,070 --> 00:00:58,450 can download and use. 13 00:00:58,510 --> 00:01:03,100 These are free and you're allowed to download them and download them from Microsoft's Web site. 14 00:01:03,340 --> 00:01:06,660 So you need to go into this link to download it. 15 00:01:08,120 --> 00:01:10,530 As you can see here this is the same link. 16 00:01:10,610 --> 00:01:14,410 So make sure you select what host operating system you have. 17 00:01:14,410 --> 00:01:19,070 So if you have Windows you click on the windows tab if you have Mac on the Mac and if you have Linux 18 00:01:19,070 --> 00:01:25,270 on the next I have a Mac so I clicked on the maktab and from here make sure you select Windows then 19 00:01:25,280 --> 00:01:30,470 stable and make sure you select the virtual box image. 20 00:01:30,840 --> 00:01:37,180 So these are all applications that allow you to install virtual machines at the moment you are using 21 00:01:37,180 --> 00:01:38,730 a virtual box for everything. 22 00:01:38,760 --> 00:01:42,840 So just make sure you use the virtual box image. 23 00:01:42,960 --> 00:01:50,970 Once you do that you will have as a file like this one uncompress it and you will get this file right 24 00:01:50,970 --> 00:01:51,500 here. 25 00:01:51,510 --> 00:01:56,540 Now this is a virtual machine a virtual box virtual machine file. 26 00:01:56,610 --> 00:02:04,280 So I'm going to double click it and as you can see in virtual boxes asking me to import this machine 27 00:02:04,390 --> 00:02:07,850 it's already set up the settings for it right here. 28 00:02:07,850 --> 00:02:11,810 Now we can imported the way it is and then modify the settings. 29 00:02:11,840 --> 00:02:18,920 Now as you can see here I have my windows installed right here and I'm just going to boot into it by 30 00:02:19,220 --> 00:02:23,740 actually I'm going to modify the settings first because I remember I think it gave it for the exit ramp. 31 00:02:23,750 --> 00:02:25,260 I think that's too much. 32 00:02:25,370 --> 00:02:31,870 So I'm going to go in to here and I'll also this to get two gigs. 33 00:02:33,270 --> 00:02:34,090 And. 34 00:02:34,320 --> 00:02:35,080 Yes. 35 00:02:35,180 --> 00:02:35,880 OK. 36 00:02:36,910 --> 00:02:40,220 And I started. 37 00:02:40,430 --> 00:02:42,470 And as you can see windows started straight away. 38 00:02:42,480 --> 00:02:43,750 No need to install it. 39 00:02:43,800 --> 00:02:55,490 It's already installed and ready and given to us by Microsoft. 40 00:02:55,500 --> 00:03:00,960 Now as you can see we have a fully working Windows machine right here windows down and this is going 41 00:03:00,960 --> 00:03:09,060 to be our third machine that we're going to use to us in our lab and it's going to be our second attacking 42 00:03:09,060 --> 00:03:09,410 machine. 43 00:03:09,420 --> 00:03:12,240 So it's our second victim our target machine. 44 00:03:12,240 --> 00:03:19,200 The machine is the one that we're going to be using to attack both of these machines that Windows machine 45 00:03:19,500 --> 00:03:21,420 and the US floatable machine.