1 00:00:12,110 --> 00:00:16,760 Hi and welcome back to another episode on How to Hack the Terrible, discussing how you can install 2 00:00:16,760 --> 00:00:19,280 and run colonics on Oracle Virtual Box. 3 00:00:19,550 --> 00:00:23,890 So this would really affect how we would do all the upcoming cybersecurity. 4 00:00:23,900 --> 00:00:29,810 Turrell's and I'm really excited to get started on Colonics 20 20 so that we can look at some of the 5 00:00:29,810 --> 00:00:34,730 new software that comes with it and think of all the different ways of doing the vulnerability testing, 6 00:00:34,850 --> 00:00:37,290 especially with the latest version of colonics. 7 00:00:37,640 --> 00:00:40,780 So without further ado, let's get started on today's tutorial. 8 00:00:41,180 --> 00:00:45,980 So what we have here is a Windows 10 running and you can open up any of your favorite browser. 9 00:00:46,010 --> 00:00:47,690 So in this case, I will open up Chrome. 10 00:00:47,690 --> 00:00:53,780 So it could be Firefox or Internet Explorer and I can go into Google dot com and I can enter my favorite 11 00:00:54,680 --> 00:01:00,620 operating system called Linux Excel, and we could go into the official Colonics Dawg page. 12 00:01:00,620 --> 00:01:02,240 So is by offensive security. 13 00:01:02,690 --> 00:01:08,330 And of course you can choose to install the 64 bit installer ability to bid and so on. 14 00:01:08,690 --> 00:01:13,310 So what we would choose and what we select is actually the virtual box 64 bit. 15 00:01:13,580 --> 00:01:16,940 Now we can go into the offensive security VM download page. 16 00:01:17,690 --> 00:01:24,050 So once we're in here, we can actually download it directly so we can open up the virtual box images 17 00:01:24,320 --> 00:01:28,820 and select the 60 for a bit of a so we can click on that. 18 00:01:29,390 --> 00:01:33,080 So this will allow us to download it into the page. 19 00:01:33,080 --> 00:01:34,460 So we'll click safe. 20 00:01:34,460 --> 00:01:36,170 So it will be a olva fall. 21 00:01:36,560 --> 00:01:41,900 It is about three point one gigabytes, so it will take some time for the download complete. 22 00:01:42,290 --> 00:01:48,440 So go ahead, grab a cup of coffee or grab a sandwich and come back in 30 minutes time. 23 00:01:48,860 --> 00:01:53,090 So we have completed a download of the Ovie file and you can actually click on it. 24 00:01:53,510 --> 00:01:59,330 And once you click on it, it will automatically be imported into your Oracle virtual box manager. 25 00:01:59,720 --> 00:02:05,210 And you can actually see the virtual sys information over here and we can have the DVD soundcard and 26 00:02:05,210 --> 00:02:05,840 so on. 27 00:02:06,440 --> 00:02:10,240 And of course, you can reinitialize the Mac address of all network cards, too. 28 00:02:10,280 --> 00:02:15,410 And of course, all this information will really help, especially in terms of setting up the call on 29 00:02:15,410 --> 00:02:16,010 Xbox. 30 00:02:16,010 --> 00:02:17,810 And we can go ahead and click import. 31 00:02:18,410 --> 00:02:23,020 And of course, here we have the software license agreement that we have to agree with so we can go 32 00:02:23,030 --> 00:02:24,200 in and click agree on that. 33 00:02:24,900 --> 00:02:29,660 And of course, once we have all this information being important, it will take about a minute, maybe 34 00:02:29,660 --> 00:02:30,920 two minutes, three minutes. 35 00:02:31,260 --> 00:02:36,500 And if you're using a hard disk drive, you could take all the way up to a couple of hours. 36 00:02:36,980 --> 00:02:42,350 So once we have done importing the virtual disk image, we'll be really, really excited to get started 37 00:02:42,350 --> 00:02:43,900 on colonics 20 20. 38 00:02:44,330 --> 00:02:49,610 Now, the importance completed and we can go into colonics 20, 20 and we can click on under settings 39 00:02:49,610 --> 00:02:51,260 so we can click into general. 40 00:02:51,260 --> 00:02:54,290 And we see that we are using a 64 bit Debian. 41 00:02:54,800 --> 00:02:56,030 And you can look at the advance. 42 00:02:56,030 --> 00:02:58,490 So we have a clip board drag and drop. 43 00:02:58,820 --> 00:03:03,290 And of course, they also put in the description so we can see the username and password is called the 44 00:03:03,290 --> 00:03:03,920 Anchalee. 45 00:03:04,460 --> 00:03:06,490 So we will not enable encryption at all. 46 00:03:06,500 --> 00:03:12,300 So system wise, we have a base memory are two four eight megabyte and we have a processor of a list 47 00:03:12,300 --> 00:03:12,980 to processor. 48 00:03:12,980 --> 00:03:14,660 So that will really help speed things up. 49 00:03:15,230 --> 00:03:20,240 And in terms of display, we got a video memory of one, two, eight megabyte and of course, one kind 50 00:03:20,270 --> 00:03:21,830 of monitor and so on. 51 00:03:21,830 --> 00:03:23,750 Storage wise, pretty straightforward. 52 00:03:23,810 --> 00:03:25,640 We got a Satah on colonics. 53 00:03:25,640 --> 00:03:26,300 Twenty, twenty. 54 00:03:26,960 --> 00:03:31,400 And of course I've disabled all the oil because I don't really want to enable audio on my virtual machines. 55 00:03:31,400 --> 00:03:37,130 And network wise, we're using breach adapter so we get an independent IP address coming from a DCPI 56 00:03:37,130 --> 00:03:38,720 Lisse, she reports. 57 00:03:38,720 --> 00:03:40,100 I'm not using and USB. 58 00:03:40,100 --> 00:03:43,130 I have to select one point one because my motherboard is for one point one. 59 00:03:43,490 --> 00:03:46,040 So it depends on what kind of setup you have for your motherboard. 60 00:03:46,250 --> 00:03:51,770 So chances are you may be using 2.0 or 3.0 depending on what's available in terms of the USB controller 61 00:03:52,520 --> 00:03:53,150 shet folder. 62 00:03:53,160 --> 00:03:55,910 We have nothing user interface pretty much standard on this. 63 00:03:56,330 --> 00:03:58,850 So once we're OK, we're good to go. 64 00:03:59,090 --> 00:04:00,460 Go ahead and start. 65 00:04:00,860 --> 00:04:05,030 So I'm really excited because we'll be moving all of our tutorials into colonics. 66 00:04:05,030 --> 00:04:05,780 Twenty, twenty. 67 00:04:06,110 --> 00:04:11,780 And this is going to be a great deal for us because it will really be helpful in terms of setting up 68 00:04:11,780 --> 00:04:14,480 new tutorials, new cybersecurity learnings for you. 69 00:04:15,050 --> 00:04:16,970 So now we are loading into colonics. 70 00:04:16,970 --> 00:04:22,570 Twenty twenty and we are loading it, building up very nice boot up interface now though, we can see 71 00:04:22,590 --> 00:04:26,030 over there and we'll be problem for TI username and password. 72 00:04:26,030 --> 00:04:30,430 So go ahead and Taculli for the username and password login. 73 00:04:30,860 --> 00:04:33,140 And of course let's see what we get over here. 74 00:04:33,530 --> 00:04:35,630 So we see a lot of details. 75 00:04:35,630 --> 00:04:39,680 It's a little smaller, so let's see whether we can maximize it and see more. 76 00:04:39,680 --> 00:04:40,190 Thanks. 77 00:04:40,610 --> 00:04:41,510 Yes, we do. 78 00:04:41,510 --> 00:04:45,920 And we can see is a very, very nice, very different graphical user interface. 79 00:04:45,920 --> 00:04:47,270 Everything looks a lot sharper. 80 00:04:47,270 --> 00:04:47,840 Very nice. 81 00:04:47,840 --> 00:04:48,920 I really like it a lot. 82 00:04:49,520 --> 00:04:55,610 So here we got the usual stuff, information gathering, vulnerability assessment, web application 83 00:04:55,610 --> 00:04:59,060 analyses, database assessment, password attacks. 84 00:04:59,060 --> 00:05:04,760 I think we can install a lot more database assessment to wireless attacks, furniture, CRAGG Everything 85 00:05:04,760 --> 00:05:05,390 is there. 86 00:05:05,750 --> 00:05:06,650 Betacam Definitely. 87 00:05:06,650 --> 00:05:07,910 We need to install that to. 88 00:05:08,210 --> 00:05:13,610 Reverse engineering, I think there's a lot more things we can put in really excited, so derrius it 89 00:05:13,670 --> 00:05:18,740 how quickly we could actually get colonics 20 20 installed into Oracle Voicebox. 90 00:05:18,950 --> 00:05:24,650 So this would really help us get ready for twenty twenty and be able to do all our cybersecurity tutorials 91 00:05:24,650 --> 00:05:26,170 with this new operating system. 92 00:05:26,330 --> 00:05:31,720 I'm really excited to start sharing with you more about cybersecurity with this new operating system. 93 00:05:32,060 --> 00:05:35,840 So I hope you learned something valuable in today's tutorial and you have any questions before you leave 94 00:05:35,840 --> 00:05:36,620 a comment below. 95 00:05:37,070 --> 00:05:42,110 Try my best to answer any of those questions and remember the like share and subscribe to the channel 96 00:05:42,260 --> 00:05:45,320 so that you can be kept abreast of the latest cybersecurity tutorial. 97 00:05:45,500 --> 00:05:47,060 Thank you so much once again for watching.