1 00:00:00,180 --> 00:00:05,880 Even though you don't need to know how to implement a cyber attacks for the cyber ops exam it really 2 00:00:05,880 --> 00:00:12,540 helps to see how attacks are executed to help you understand how things work and the best way to play 3 00:00:12,540 --> 00:00:20,190 around with hacking is Kelly Kelly runs on a Linux operating system and has a large collection of hacking 4 00:00:20,190 --> 00:00:20,780 tools. 5 00:00:22,150 --> 00:00:24,790 In addition to playing around with hacking tools. 6 00:00:24,790 --> 00:00:31,120 You will also be able to learn how to use the Linux operating system which is a great skill to have 7 00:00:31,210 --> 00:00:33,460 for any i feel. 8 00:00:33,470 --> 00:00:39,290 So before I teach you about cybersecurity I want to give you a chance to install Caylee and then you 9 00:00:39,290 --> 00:00:46,160 can follow along with some of the later examples throughout this course to install Kelli. 10 00:00:46,190 --> 00:00:50,420 You could actually just install it right on your laptop or desktop computer. 11 00:00:50,600 --> 00:00:56,030 But typically you're going to want to run it in the background and not make it your primary operating 12 00:00:56,030 --> 00:00:56,900 system. 13 00:00:57,260 --> 00:01:05,090 So for myself I have a Windows laptop and I run a VM software that runs Kaylie in the background as 14 00:01:05,090 --> 00:01:13,120 a secondary operating system I happen to use VM where a workstation for my VM ware software but it is 15 00:01:13,120 --> 00:01:15,360 licensed and not free. 16 00:01:16,660 --> 00:01:19,990 You want a free VM software application. 17 00:01:19,990 --> 00:01:27,730 You can run things like a virtual box or ESX hi I'm going to show you how to install the VM or software 18 00:01:27,730 --> 00:01:30,280 a virtual box since it's free. 19 00:01:30,280 --> 00:01:39,160 And then once we install virtual box we'll download the free Kalli iso file install it and get you up 20 00:01:39,160 --> 00:01:44,810 and running with Kelly Linux so that you're ready to start playing around with hacking tools. 21 00:01:44,860 --> 00:01:49,500 So let's get started by first going to the Virtual Box Web site. 22 00:01:49,780 --> 00:01:53,140 So you go to virtual Boxtel org. 23 00:01:53,440 --> 00:02:00,830 And when you get to the home page you'll see a download and virtual box button began that and then it'll 24 00:02:00,880 --> 00:02:08,620 take you to the Virtual Box download page and you'll see that you have options to choose a Windows host 25 00:02:09,340 --> 00:02:13,480 Mac OSX host or Linux host download. 26 00:02:13,480 --> 00:02:19,930 For myself I'm using a Windows computer so I'm going to download the Windows host file and then you're 27 00:02:19,930 --> 00:02:27,520 going to run the executable that you're downloading from the Web site and then just sit next and install 28 00:02:27,520 --> 00:02:30,980 throughout the installation process. 29 00:02:33,000 --> 00:02:39,060 Once you have the virtual box application running on your computer you're ready to install a virtual 30 00:02:39,060 --> 00:02:41,790 machine for Kelly Linux. 31 00:02:41,790 --> 00:02:47,400 First we have to go to the Kelley download web site and download the iso file. 32 00:02:47,490 --> 00:02:51,790 Now we're going to later import into a virtual box or whatever. 33 00:02:52,830 --> 00:02:58,670 Virtual Machine applications are using and then install it as a virtual machine. 34 00:03:00,140 --> 00:03:09,910 So let's go to the Kalli Web site which is carried out org and then go to downloads and you'll see that 35 00:03:09,910 --> 00:03:14,030 you have different download options to choose from. 36 00:03:14,050 --> 00:03:21,960 I'm going to choose the Kaylie 64 bit iso file to download into my virtual box environment. 37 00:03:22,140 --> 00:03:28,140 I'll just save that into my downloads and then once the file finishes downloading to my computer I will 38 00:03:28,200 --> 00:03:37,300 open it into my virtual machine application and go through the installation process. 39 00:03:37,340 --> 00:03:45,440 OK now that my Kelly Linux download has completed I'm ready to import it into my virtual machine application. 40 00:03:45,990 --> 00:03:54,080 So I'll open up my virtual box software here and I'm going to go to machine and new 41 00:03:56,890 --> 00:04:07,710 call this VM Kaylie the type of operating system is going to be Linux and then I'm fine aboon to 64 42 00:04:07,710 --> 00:04:11,290 bit hit next. 43 00:04:11,700 --> 00:04:15,750 And then depending on how much RAM you have on your computer you want to be careful of how much RAM 44 00:04:15,750 --> 00:04:22,180 you allocate to this virtual machine but you're probably OK with the default value of a little bit over 45 00:04:22,380 --> 00:04:24,780 1 gig of memory. 46 00:04:24,900 --> 00:04:32,190 Hit next will leave the default setting of create a virtual hard disk now and then I'll also use the 47 00:04:32,190 --> 00:04:42,000 default value of disk file type setting for the default of dynamically allocated hard disk and then 48 00:04:42,000 --> 00:04:45,610 file location in size so be extra careful here. 49 00:04:45,930 --> 00:04:53,600 If you don't have much disk space on your computer then I recommend finding an external storage device. 50 00:04:53,670 --> 00:05:01,170 For myself I have an SD card that I have installed on my computer that I use for storing all of my VM 51 00:05:01,410 --> 00:05:02,320 information. 52 00:05:04,080 --> 00:05:05,730 So this wants 10 gig. 53 00:05:06,150 --> 00:05:11,260 I'll go and I'll choose my SD card location 54 00:05:14,590 --> 00:05:20,150 put it there and then I don't have any concerns about using all of my computer's disk space. 55 00:05:26,970 --> 00:05:36,460 Now we have to map the ISO we downloaded for the Kelly operating system so it will go to settings storage. 56 00:05:36,480 --> 00:05:44,940 Click on this empty option here under our storage tree and then if you click this disk option you can 57 00:05:44,940 --> 00:05:48,300 find your way to your ISO download. 58 00:05:48,690 --> 00:05:57,000 Click my iso download and now by choosing that it's telling this virtual machine to boot from that iso 59 00:05:57,000 --> 00:06:00,820 file and then will hit OK. 60 00:06:00,880 --> 00:06:08,330 So now once I start this virtual machine it should boot up into the Kayley operating system. 61 00:06:08,510 --> 00:06:13,640 Just so you know if you're wondering how this virtual machine is going to communicate with the network 62 00:06:14,480 --> 00:06:21,830 by default it actually uses network address translation and is translated out of our wired or wireless 63 00:06:21,860 --> 00:06:22,880 adapters. 64 00:06:24,420 --> 00:06:26,250 Ok so my VM is built. 65 00:06:26,250 --> 00:06:36,380 I'm going to click the Start button and now I have this counsil window here to access my virtual machine. 66 00:06:36,380 --> 00:06:40,040 So I'm just going to enter for this live EMT 64 option 67 00:06:43,970 --> 00:06:49,000 and then it might take a little bit but it will eventually load the Kelly operating system. 68 00:06:49,030 --> 00:06:54,340 You'll notice on the left side of your colleague desktop you'll have a list of some of the different 69 00:06:54,340 --> 00:06:56,710 applications that you can launch like matter ploy. 70 00:06:56,980 --> 00:07:02,530 And if you actually go all the way down to show applications here you'll find a large collection of 71 00:07:02,530 --> 00:07:06,880 the different hacking tools that Caylee has to offer throughout this course. 72 00:07:06,880 --> 00:07:14,760 We will demo some of these hacking tools just to give you a quick glimpse into what you'll find in here. 73 00:07:14,980 --> 00:07:23,230 We'll click on the exploit application folder and one of my favorite applications in Cali is the social 74 00:07:23,230 --> 00:07:24,480 engineering toolkit. 75 00:07:24,760 --> 00:07:31,600 Click on them and it's going to take us to a terminal with some of the different categories that we 76 00:07:31,600 --> 00:07:34,460 can choose from for different attack types. 77 00:07:34,600 --> 00:07:43,140 I'll choose one for social engineering attacks and as you can see we have a variety of social engineering 78 00:07:43,140 --> 00:07:45,290 attacks that we can execute. 79 00:07:46,390 --> 00:07:48,520 So take some time to play around in here. 80 00:07:48,550 --> 00:07:56,150 I'll have some links in the lecture resources to documentation on how to run some of the different attacks. 81 00:07:56,250 --> 00:07:58,380 Let's try to be nice guys out there OK. 82 00:07:58,710 --> 00:08:04,960 No don't use this to hack into your neighbor's network or your friends or family Khail he should really 83 00:08:04,960 --> 00:08:11,770 be looked at as a tool to help you better understand what kind of threats there are out there so that 84 00:08:11,770 --> 00:08:14,440 you can be a better cyber security engineer. 85 00:08:15,720 --> 00:08:19,200 One last thing I want to point out before I end this Kelly demo. 86 00:08:19,620 --> 00:08:21,920 If you have to log back in to Cali. 87 00:08:21,930 --> 00:08:28,590 Like if your session times out there is a default username and password the default username is root 88 00:08:29,160 --> 00:08:35,750 and the default Kelleys password is the reverse of root and is t o r.