1 00:00:00,660 --> 00:00:01,020 Hello. 2 00:00:01,470 --> 00:00:07,770 As you remember where our the least tunnels or penetration testing lab. 3 00:00:08,160 --> 00:00:12,360 And now we will install Metasploit in one term. 4 00:00:13,500 --> 00:00:20,610 So the first to log in to your unmanned system, of course, I have an update to download, but I will 5 00:00:20,610 --> 00:00:23,580 not tolerate them for now. 6 00:00:24,060 --> 00:00:28,920 And then, uh, let's let's uh, up on the story. 7 00:00:29,730 --> 00:00:30,870 Let's fix that. 8 00:00:31,510 --> 00:00:41,310 OK, so now, uh, after successfully logging in with the password, we, uh, set the installation, 9 00:00:41,310 --> 00:00:46,050 so we will change to the password for it. 10 00:00:46,050 --> 00:00:52,940 So, uh, let's change to the password because we are the, uh, newly installed system. 11 00:00:53,190 --> 00:01:02,940 So for changing our password, we have to, uh, write sudo here sudo password. 12 00:01:02,940 --> 00:01:08,820 The what's actually let's increase, uh, the font a little bit here. 13 00:01:09,540 --> 00:01:10,590 Can you hear me actually? 14 00:01:10,620 --> 00:01:11,310 One, two three. 15 00:01:11,340 --> 00:01:11,640 Yes. 16 00:01:12,450 --> 00:01:14,730 So let's increase the font here. 17 00:01:16,760 --> 00:01:22,430 Here and two more sites command post text. 18 00:01:32,460 --> 00:01:47,360 Actually, huge, huge increase from four to six here and then right, Sudan and then has the ability 19 00:01:47,810 --> 00:01:50,150 and we will change the route account password. 20 00:01:50,480 --> 00:01:58,280 Well, firstly, you enter your user account password and my in my case is three to one and enter the 21 00:01:58,280 --> 00:01:58,970 new password. 22 00:01:58,980 --> 00:02:03,940 So in our root account, we have an assigned and password. 23 00:02:03,950 --> 00:02:11,730 Yet because this is because we other than the newly installed Ubuntu and we hadn't signed. 24 00:02:11,750 --> 00:02:12,740 And the password to it. 25 00:02:13,010 --> 00:02:15,320 But I will assign the password. 26 00:02:15,320 --> 00:02:24,110 So, uh, make sure you won't forget its password because it's important, uh, root password. 27 00:02:24,120 --> 00:02:32,590 So in my case, if you have a sign in either the password in your Linux, the password probably installs 28 00:02:32,930 --> 00:02:36,380 it towards the root password. 29 00:02:36,600 --> 00:02:40,250 Uh, send happens tools. 30 00:02:40,640 --> 00:02:46,350 So by setting a root password, we can switch to root anytime using the su command. 31 00:02:47,090 --> 00:02:47,690 So. 32 00:02:49,430 --> 00:02:53,090 Here we can, uh, use this, for example, so wrote. 33 00:02:53,450 --> 00:02:57,740 So now we will enter the password here, as you can see here. 34 00:02:58,010 --> 00:02:59,680 Now we are not user account. 35 00:02:59,690 --> 00:03:03,320 We are in the root account and we can do what there will be one. 36 00:03:03,320 --> 00:03:06,860 The Linux, um, now. 37 00:03:08,540 --> 00:03:18,830 Let's install Cool and Niemann-Pick my packages by typing APT, get install, call and aptitude install, 38 00:03:19,280 --> 00:03:23,990 um, IMAP before installing Metasploit so empty. 39 00:03:24,300 --> 00:03:30,890 Uh, we um, it's not mandatory to use Sudo because we already in route account. 40 00:03:31,070 --> 00:03:32,960 We can do whatever we want. 41 00:03:33,710 --> 00:03:40,520 So, uh, apt get install curl of a pretty good install curl. 42 00:03:41,540 --> 00:03:54,440 Uh, here and in Turkey, he was in Turkey and the enter here, uh, Carl is now installing and after 43 00:03:54,490 --> 00:03:57,740 and people install an app before installing Metasploit. 44 00:03:58,670 --> 00:03:59,080 Yeah. 45 00:04:02,470 --> 00:04:05,380 Now we will install, uh, sudo. 46 00:04:05,950 --> 00:04:08,110 Actually, we don't have to sudo. 47 00:04:08,470 --> 00:04:16,570 So the empty install in here, it's twenty six point three megabytes and entry and enter. 48 00:04:17,980 --> 00:04:21,370 Here we are installing and now. 49 00:04:56,150 --> 00:04:56,690 OK. 50 00:04:57,140 --> 00:04:59,210 It's actually installed. 51 00:04:59,420 --> 00:05:01,310 It's clear here. 52 00:05:02,230 --> 00:05:08,750 And now we the next we will simply we simply need to download Metasploit using the kernel. 53 00:05:09,470 --> 00:05:11,410 So, uh, actually. 54 00:05:13,820 --> 00:05:26,720 Uh, let's use curved, um, enter the Metasploit Tushnet AP setpiece, uh, are a w GitHub user content, 55 00:05:27,110 --> 00:05:33,540 but com we will use official Metasploit from a Rapid7 Rapid7 here. 56 00:05:34,050 --> 00:05:38,120 Methods Metasploit only bus. 57 00:05:39,790 --> 00:05:42,750 He is omnibus master Paul. 58 00:05:43,750 --> 00:05:49,330 And it's actually Metasploit Framework. 59 00:05:51,840 --> 00:05:55,530 Rappers here, MSF update. 60 00:05:57,010 --> 00:06:02,200 That airs here, and we will use those to MSF install fallout. 61 00:06:03,540 --> 00:06:06,120 Here, as you can see with all having it here. 62 00:06:07,290 --> 00:06:09,150 See the massive install. 63 00:06:10,320 --> 00:06:11,280 What a directory. 64 00:06:12,450 --> 00:06:12,870 Hmm. 65 00:06:15,690 --> 00:06:16,260 Actually. 66 00:06:19,760 --> 00:06:20,660 It's copied the. 67 00:06:26,450 --> 00:06:26,960 Here. 68 00:06:33,630 --> 00:06:44,100 And we set up the actual this visit, his website here will be open link me this link will open in Firefox 69 00:06:44,100 --> 00:06:46,260 web browser will fund. 70 00:06:47,160 --> 00:06:47,730 Why? 71 00:06:51,630 --> 00:06:52,050 Yes. 72 00:06:55,110 --> 00:07:01,230 Well, then let's search for it, Metasploit Stone, don't get them here. 73 00:07:03,330 --> 00:07:04,720 Uh, and here's. 74 00:07:07,520 --> 00:07:08,900 With a for war. 75 00:07:11,180 --> 00:07:12,010 He was telling. 76 00:07:14,760 --> 00:07:15,210 Here. 77 00:07:18,540 --> 00:07:19,260 And he is. 78 00:07:20,570 --> 00:07:22,090 Well, let's copy this. 79 00:07:22,450 --> 00:07:22,990 Um. 80 00:07:24,300 --> 00:07:24,750 Link. 81 00:07:30,650 --> 00:07:36,560 Here and then actually, it's not like it's in common now. 82 00:07:37,880 --> 00:07:38,780 But this year. 83 00:07:44,680 --> 00:07:45,690 And enters. 84 00:07:57,070 --> 00:07:59,860 It shouldn't look like that I have to copy this it. 85 00:08:06,210 --> 00:08:11,950 Uh, actually, it isn't one common there's actually several commands involved for. 86 00:08:13,700 --> 00:08:20,630 It's installing them, so I will pose with you here, actually piles with conjecture here, and we will 87 00:08:20,630 --> 00:08:22,700 continue on after downloading these files. 88 00:08:25,980 --> 00:08:28,680 So our Metasploit has downloaded. 89 00:08:29,050 --> 00:08:34,410 Now this is the automatically installed that we downloaded here. 90 00:08:34,740 --> 00:08:43,140 So in order to install it, let's go to emissive install folder here, as you can see after downloading. 91 00:08:43,320 --> 00:08:44,280 There's a created one. 92 00:08:45,420 --> 00:08:55,200 See, the massive install is actually, uh, we can around like that immersive installation of the folder. 93 00:08:55,940 --> 00:08:58,500 Yes, you can see here here adding Metasploit here. 94 00:08:58,950 --> 00:09:01,080 But this point is are the newest version. 95 00:09:01,080 --> 00:09:08,160 So actually, actually Metasploit is installed already because as you remember, we copied emissive 96 00:09:08,160 --> 00:09:13,870 instance, so we gave us permission to emissive install and we ran it. 97 00:09:13,890 --> 00:09:23,400 Uh, so just copy this and immersive install real, um, Metasploit Framework will install automatically. 98 00:09:24,540 --> 00:09:30,880 So exit here and serve is actually massive here. 99 00:09:31,020 --> 00:09:31,710 Massive. 100 00:09:33,910 --> 00:09:42,250 Actually, we have to run Metasploit Framework for using Pseudocode Mount, a massive comms, so. 101 00:09:43,230 --> 00:09:49,410 And enter your user password, not a root, because this is not a root account here. 102 00:09:50,860 --> 00:09:56,590 And as you can see here, our Metasploit framework is installed and ready to run.