1 00:00:01,170 --> 00:00:04,790 In this lecture we will start exploring Kylie Lennox. 2 00:00:04,920 --> 00:00:14,790 But let us first run the machine in this good mood and the first thing I want to do you that you can 3 00:00:15,060 --> 00:00:18,170 configure settings for the route. 4 00:00:18,210 --> 00:00:29,340 For example can log out or configure accounting for this account and also you can go to sittings to 5 00:00:30,910 --> 00:00:35,220 configure the settings for the system. 6 00:00:35,530 --> 00:00:49,930 And here we have the perverts bar that contains these most popular tools which can be customized and 7 00:00:49,930 --> 00:00:53,270 we can access all the tools by clicking here. 8 00:00:54,340 --> 00:01:05,860 So here we can find all the applications of Kelly Linux and we can go to the application and browse 9 00:01:05,860 --> 00:01:08,980 the categories. 10 00:01:08,980 --> 00:01:17,320 So here we have the information gathering category and here the vulnerability analysis and so on and 11 00:01:17,320 --> 00:01:21,100 we can also browse for subcategories. 12 00:01:21,130 --> 00:01:31,540 So under the information gathering category we have yes analysis IBS ID and other subcategories. 13 00:01:31,540 --> 00:01:41,610 And under the validity analysis we have just good tools parsing tools and other subcategories. 14 00:01:41,610 --> 00:01:46,660 Also let us now explore some tools. 15 00:01:46,660 --> 00:01:55,660 So for example multi go use together publicly available information about specific domain from data 16 00:01:55,660 --> 00:01:58,660 sources such as DNS records. 17 00:01:58,660 --> 00:02:08,120 Who is records search engines online social networks to realize that information in a graph form it. 18 00:02:08,200 --> 00:02:16,010 It can be relations between people emails groups with base domains networks and internet infrastructure 19 00:02:18,400 --> 00:02:25,690 and Nicole is an open source web server scanner which performs comprehensive tests against web servers 20 00:02:25,690 --> 00:02:32,770 for potentially dangerous files on programs outdated virgins virgins history problems server configuration 21 00:02:32,770 --> 00:02:38,530 issues and will attempt to identify installed servers and software. 22 00:02:40,260 --> 00:02:50,440 And we have aircraft engines which is a complete suite of tools to assist Wi-Fi network security through 23 00:02:50,650 --> 00:02:58,180 packet capturing conducting attacks distinct abilities and cracking Wi-Fi passwords. 24 00:02:58,180 --> 00:03:01,840 We can also use scabby 25 00:03:05,130 --> 00:03:09,730 which is a wonderful interactive packet manipulation Python paste program. 26 00:03:09,960 --> 00:03:17,610 It is able to form or decode packets of a wide number of protocols send them on the wire capture them 27 00:03:17,910 --> 00:03:22,030 much requests and replies add much more. 28 00:03:22,200 --> 00:03:29,860 So for example you can use it for IP address spoofing manipulating TCB flux and traffic sniffing. 29 00:03:30,390 --> 00:03:37,980 So in this lecture we have explored clinics and some of its tools and in the next lecture we will download 30 00:03:38,130 --> 00:03:41,100 and install the meet exploitable VM.