1 00:00:01,580 --> 00:00:07,350 ‫We will set up a virtual network structure for the applications we will do in the training. 2 00:00:07,370 --> 00:00:12,950 ‫In this way, we will prevent damage to real systems and other devices connected to the network while 3 00:00:12,950 --> 00:00:14,400 ‫making applications. 4 00:00:14,420 --> 00:00:20,900 ‫It is necessary to set up a virtual network in the virtual box, because during the course, we will 5 00:00:20,900 --> 00:00:25,100 ‫ensure that all the virtual machines we will use are in the same virtual network. 6 00:00:25,250 --> 00:00:30,710 ‫A network is the ability of multiple devices to communicate with each other, wired or wirelessly. 7 00:00:30,800 --> 00:00:33,380 ‫It is used for connection to a network device. 8 00:00:33,380 --> 00:00:39,230 ‫Usually we will configure a Nat network so that all virtual machines are on the same network. 9 00:00:39,320 --> 00:00:45,770 ‫When we create a Nat network, the virtualization program will automatically assign IP to all computers 10 00:00:45,770 --> 00:00:46,760 ‫on this network. 11 00:00:47,000 --> 00:00:51,950 ‫YP is the address required for a computer to communicate with other computers over the network. 12 00:00:51,980 --> 00:00:54,440 ‫Each computer must have a different IP. 13 00:00:54,590 --> 00:00:58,460 ‫Every computer connected to the internet has an IP address. 14 00:00:58,760 --> 00:01:00,590 ‫It stands for address for computers. 15 00:01:00,620 --> 00:01:03,080 ‫Each computer must have a different address. 16 00:01:03,170 --> 00:01:07,880 ‫There are two different versions of the IP address IPv4 and IPv6. 17 00:01:07,910 --> 00:01:11,220 ‫The commonly used IPV four is 32 bits long. 18 00:01:11,240 --> 00:01:14,990 ‫It consists of four eight bit numbers, each separated by dots. 19 00:01:15,260 --> 00:01:20,840 ‫Example 192.168 1.1. 20 00:01:20,930 --> 00:01:26,090 ‫Each group of numbers can have a value between zero 255. 21 00:01:26,180 --> 00:01:31,160 ‫If there are two computers with the same IP, there will be IP conflicts on the network. 22 00:01:31,190 --> 00:01:35,750 ‫Dhcp, the anemic host configuration protocol is used to prevent this. 23 00:01:35,900 --> 00:01:39,740 ‫Dhcp assigns a different IP to each computer. 24 00:01:39,770 --> 00:01:41,900 ‫This does not cause IP conflict. 25 00:01:42,050 --> 00:01:43,820 ‫To set up a Nat network. 26 00:01:45,930 --> 00:01:47,100 ‫Click on file. 27 00:01:47,100 --> 00:01:48,330 ‫Click preferences. 28 00:01:51,200 --> 00:01:53,570 ‫Click network on the incoming screen. 29 00:01:53,690 --> 00:01:56,690 ‫Click ads new Nat networks on this screen. 30 00:01:58,910 --> 00:02:00,250 ‫Click on the arrow sign. 31 00:02:00,260 --> 00:02:04,400 ‫Exit is done to add virtual machines to the network. 32 00:02:04,430 --> 00:02:06,200 ‫Click on the virtual machine. 33 00:02:06,200 --> 00:02:07,430 ‫Click on setting. 34 00:02:07,430 --> 00:02:10,100 ‫Click network on the incoming screen. 35 00:02:10,220 --> 00:02:13,460 ‫On the screen, select Net network from Attach to option. 36 00:02:13,490 --> 00:02:15,140 ‫Click on the arrow sign. 37 00:02:18,060 --> 00:02:20,940 ‫Repeat the same process for other virtual computers. 38 00:02:55,580 --> 00:02:56,900 ‫Connection test. 39 00:02:57,320 --> 00:03:01,400 ‫Testing that the installed virtual machines can communicate with each other. 40 00:03:01,490 --> 00:03:07,070 ‫For this test, we need to check that each virtual computer can communicate with each other. 41 00:03:07,100 --> 00:03:12,020 ‫For this, it is enough to check whether the virtual computers are on the same network and ping each 42 00:03:12,020 --> 00:03:14,300 ‫other to check the IP value. 43 00:03:14,300 --> 00:03:18,590 ‫The network settings can be checked or it can be checked from the command line. 44 00:03:18,710 --> 00:03:24,950 ‫It is more preferable to use the command line because many programs used for penetration testing run 45 00:03:24,980 --> 00:03:26,000 ‫on the command line. 46 00:03:26,090 --> 00:03:29,030 ‫Command line command is an important advantage. 47 00:03:29,030 --> 00:03:34,400 ‫Not all programs have GUI screens to check the IP value from the command line. 48 00:03:34,490 --> 00:03:41,180 ‫This process is done in different ways for Windows and Linux, macOS operating systems for IP control, 49 00:03:41,180 --> 00:03:43,730 ‫and Linux and macOS operating systems. 50 00:03:43,850 --> 00:03:45,260 ‫Terminal opens. 51 00:03:45,440 --> 00:03:48,500 ‫Type ipconfig at the command line and press enter. 52 00:03:48,620 --> 00:03:54,200 ‫In the screen that appears at 10.0, 2.7 is the computer IP. 53 00:03:54,650 --> 00:03:58,970 ‫The IP value here may be different for your system IP. 54 00:03:59,000 --> 00:04:00,470 ‫Check for windows computers. 55 00:04:00,860 --> 00:04:02,390 ‫Open the command line. 56 00:04:02,420 --> 00:04:05,660 ‫Click on start Search and cmd is typed. 57 00:04:05,810 --> 00:04:07,460 ‫Click on Cmd.exe. 58 00:04:08,030 --> 00:04:09,320 ‫Open the command line. 59 00:04:09,530 --> 00:04:13,460 ‫Type ipconfig at the command line and press enter. 60 00:04:13,580 --> 00:04:20,120 ‫The screen will display IPv4 address 10.0 .2.6 computer IP. 61 00:04:20,510 --> 00:04:24,140 ‫The IP value here may be different on your system. 62 00:04:24,410 --> 00:04:29,270 ‫Now we need to test the Kali Linux virtual system can communicate with other virtual systems over the 63 00:04:29,270 --> 00:04:29,960 ‫network. 64 00:04:29,990 --> 00:04:32,300 ‫For this Open Kali Linux. 65 00:04:32,600 --> 00:04:37,100 ‫Click on terminal typing the IP address of the Metasploitable computer. 66 00:04:37,250 --> 00:04:41,480 ‫To do this type ping Metasploit IP value and press enter. 67 00:04:41,600 --> 00:04:44,420 ‫The screen will show that the ping packets are going. 68 00:04:44,450 --> 00:04:50,210 ‫This means that communication is taking place putting the IP address of the computer. 69 00:04:50,240 --> 00:04:54,200 ‫To do this, enter ping OSP value and press enter. 70 00:04:54,320 --> 00:04:57,080 ‫The display shows that ping packets are going out. 71 00:04:57,080 --> 00:04:59,540 ‫In this case communication is taking place. 72 00:05:01,930 --> 00:05:08,590 ‫Bring the IP address of the Windows 7 computer for this ping win7 IP value and press Enter key. 73 00:05:08,740 --> 00:05:11,670 ‫The screen shows that the ping packets are going. 74 00:05:11,680 --> 00:05:14,450 ‫In this case, communication is taking place. 75 00:05:14,470 --> 00:05:17,560 ‫If it is seen on the screen that ping packets do not go. 76 00:05:17,590 --> 00:05:22,960 ‫This may be because ping requests are blocked on the firewall on the Windows 7 computer. 77 00:05:23,050 --> 00:05:27,790 ‫In this case, you can test whether there is communication by doing the reverse operation. 78 00:05:28,150 --> 00:05:30,760 ‫Log in to the Windows 7 computer. 79 00:05:30,850 --> 00:05:32,410 ‫Click the start button. 80 00:05:32,410 --> 00:05:34,510 ‫Type cmd in the search field. 81 00:05:34,780 --> 00:05:36,510 ‫Open the command line. 82 00:05:36,520 --> 00:05:43,780 ‫Enter the IP address of the Kali Linux computer in the command line, type ping Kali IP value and press 83 00:05:43,780 --> 00:05:44,560 ‫enter key. 84 00:05:44,710 --> 00:05:47,740 ‫It is seen on the screen that ping packets are going. 85 00:05:47,740 --> 00:05:50,380 ‫In this case communication is taking place. 86 00:05:50,680 --> 00:05:57,580 ‫Seeing the IP address of Windows 8 computer for this ping Win8 IP value is typed in enter, key is pressed. 87 00:05:57,610 --> 00:05:59,950 ‫The ping packets are shown on the screen. 88 00:05:59,950 --> 00:06:02,440 ‫In this case, communication is taking place. 89 00:06:02,560 --> 00:06:05,770 ‫If it is seen on the screen that ping packets do not go. 90 00:06:05,800 --> 00:06:10,420 ‫This may be because ping requests are blocked on the firewall on the Windows 8 computer. 91 00:06:10,540 --> 00:06:15,970 ‫In this case, you can test whether there is communication by doing the reverse operation. 92 00:06:16,030 --> 00:06:18,250 ‫Log in to the Windows 8 computer. 93 00:06:18,280 --> 00:06:19,870 ‫Click the start button. 94 00:06:19,870 --> 00:06:21,850 ‫Type cmd in the search field. 95 00:06:21,970 --> 00:06:23,470 ‫Open the command line. 96 00:06:23,590 --> 00:06:30,280 ‫Enter the IP address of the Kali Linux computer in the command line, type ping Kali IP value and press 97 00:06:30,280 --> 00:06:31,210 ‫enter key. 98 00:06:31,330 --> 00:06:34,180 ‫It is seen on the screen that ping packets are going. 99 00:06:34,180 --> 00:06:37,360 ‫In this case communication is taking place. 100 00:06:37,660 --> 00:06:41,830 ‫Ping the IP address of the windows XP computer for this type. 101 00:06:41,830 --> 00:06:45,520 ‫Ping windows XP IP value and press enter key. 102 00:06:45,700 --> 00:06:48,310 ‫The ping packets are shown on the screen. 103 00:06:48,430 --> 00:06:51,250 ‫In this case, communication is taking place. 104 00:06:51,370 --> 00:06:54,760 ‫If it is seen on the screen that ping packets do not go. 105 00:06:54,790 --> 00:07:00,520 ‫This may be because ping requests are blocked on the firewall on the windows XP computer. 106 00:07:00,610 --> 00:07:05,590 ‫In this case, you can test whether there is communication by doing the reverse operation. 107 00:07:05,710 --> 00:07:08,290 ‫Log in to the windows XP computer. 108 00:07:08,410 --> 00:07:12,280 ‫Click the start button, type cmd in the search field. 109 00:07:12,580 --> 00:07:13,930 ‫Open the command line. 110 00:07:14,080 --> 00:07:21,460 ‫Enter the IP address of the Kali Linux computer in the command line, type ping Kali IP value and press 111 00:07:21,460 --> 00:07:22,270 ‫enter key. 112 00:07:22,450 --> 00:07:25,660 ‫It is seen on the screen that ping packets are going. 113 00:07:25,870 --> 00:07:28,900 ‫In this case communication is taking place. 114 00:07:29,050 --> 00:07:31,240 ‫Now our Net network is ready.