Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back to the cyber recourse in building your info sec. Clap your host on instructor Kevin Hernandez. In her previous lesson, we discussed a horror requirements for s sign, yams and wet proxies. We noticed that some of these tools, specifically that snort
00:16
and all sec were misclassified, and we're really more towards the ideas I PS type of tools. We also noticed that the Web proxy take a squid was more off integration into your current Santos insulation and therefore does not need additional horror requirements.
00:35
Overdose off the base offering system. Now it will put some a little bit of Henderson performance on the operating system, but it's not a specific insulation that will require you to create an image itself. Now, something else to consider also is that many of these tools
00:53
specifically ideas and i. P s already
00:56
part of next Gen. Pharrell's. And it is really important in this lesson,
01:03
as we will be discussing the horror record Mints for ideas i p SS validity scanners, domain controllers, yes, excite pen tests and forensic tools. Now this seems a lot of resources, but as we know from freres lesson, many of the ideas and I PS is already included in next Gen firewalls.
01:22
Therefore, this list is actually a lot smaller than it really is.
01:26
Now let's get started.
01:27
Now Let's take a quick look into our world file and you can see Sorry, Caught. It's sort of the only one who haven't really looked at and security onion.
01:36
So if you look for Suri kata,
01:38
you can actually go to hear the docks and go to insulation night
01:45
and you can see then
01:47
it's more of a package. You can install your own OS
01:52
right? It's not an appliance itself like curator and therefore even come here, you can see how to install it within Santo's,
02:00
and in reality you can install this.
02:04
We just have your wet minutes. Well, it doesn't have too much info when it comes to hardware requirements.
02:10
But as I mentioned earlier synced, we do have disintegrated into the next gen firewalls such as PF, since we can actually ignore this if you really want to.
02:21
But however less techno tw into our sheet
02:24
s mentioned previously, so this opener sheet
02:29
and in emergencies to be stay organized
02:32
and say sure ricotta right, and it can be
02:36
with incentives and just at that small detail over there.
02:42
And that should really
02:46
be the end of it. If you want to call it like that
02:52
there
02:53
now, the other one's being stored and old sec, right?
03:00
You have the same approach,
03:05
and you can just copy them like this
03:08
on.
03:09
That's really it for I P s. That's why I didn't want to cover too much on it.
03:14
And therefore, let's go back to a document. And now we have, let's say, two birds machines s X, I write.
03:20
So let's go to E S X. I hear hardware requirements
03:28
and there you go.
03:30
And actually, in that same sheet, you saw how much you need it. You need to CPU course, and
03:37
Fergie divides less, actually search Ram,
03:42
Uh, forgive us, Ram or around eight, give or take
03:47
and see. You
03:50
say much to course doesn't say the frequency, so it should be pretty good.
03:57
And we will actually go a little bit deeper into this. Yes, excitement in another video that I already prepare for you. So for virtual machines, fear version center, Yes, excite.
04:10
All right.
04:12
And you have four gigs of Ram
04:17
and it says to CTU course
04:20
to course. Give or take.
04:24
Of course. Your take. And
04:27
that's about it. That's why we're adding so much stuff
04:30
into this lesson s You can see
04:33
data. It's very minimal. And XXIII itself was having oh, model. So don't worry about having
04:41
this little details.
04:43
Not privileged scanners, Right? We have ness is
04:46
And we had open bus, right? The open bat itself. It's inside. Callie Lennox.
04:53
So
04:54
open birth.
04:57
We're just going to say
05:00
inside
05:00
pin test tool
05:03
and let's look. And missus,
05:10
these are the type of tools dead.
05:14
You're gonna have more in the offline type of approach. So you're gonna have it. Maybe in your own personal computer. Just around the scam from there is required. You can see it's a two gigahertz score.
05:27
Four to the ahead score.
05:29
Right. And you have forgets of ram, give or take eight recommended
05:34
and actually updating the sheet
05:38
right there was just out of the screen for a second.
05:43
And this is sorry. This is
05:46
yeah,
05:48
Messis
05:51
and opened us
05:55
this inside dentist
05:59
talking about Penn. Tess, Let's give a quick look into that.
06:03
We're only gonna look at the Cali box.
06:08
So Cali hardware requirements,
06:12
and you can see 20 gives for RAM to the advice of more
06:15
one or two gigs of RAM and 20 gives a storage. And once, if you should be enough.
06:20
So, Callie
06:23
All right, so it's
06:25
one core
06:27
one core.
06:29
You have one gig,
06:30
one gig. What does this mean? It's very low on resource is, and therefore you can actually run it in your own personal computer
06:39
That something has to be somewhere player. Or you can have. It s a dedicated machine, A swell. I personally like to have it in my own personal computer, so I don't have to be promoting into it.
06:48
But
06:49
everyone has their own favorite things right now. The last one we have to check. It's the forensics
06:56
systems, right?
06:57
And if we make sure you go here right. Contest.
07:01
Forensics. Search machines covered, covered, covered, right.
07:05
And regarding too
07:09
targets. We're not actually gonna put a targeted system of a little system in our network on lettuce Really acquired. So are highly recommend. Those are offline. Unless you're gonna be using them
07:19
or you can use online. Um,
07:23
tools are only system where you BP and with your computer and then just targeted them over there. So let's look att, autopsy and oxygen
07:30
s. So let's look at autopsy
07:34
Foreign six. Stella
07:40
here.
07:42
You can see that it is both for Lennox on access
07:46
and therefore
07:49
used Donald a SCIF file, et cetera. Right.
07:54
And here you have documents,
07:58
actually, Just literally types lookit harbor requirements. You can say it's a gigs of RAM
08:05
and something to consider. Um,
08:11
autopsy, Right?
08:13
Is that
08:15
the amount of stories you need, It's directly related to what forensic work you're gonna do in other hands.
08:22
In other words, sorry. If you're gonna image a 16 gig
08:28
RAM system, right, fixing gift, a ram's own system, you need at least 2030 gigs in your system in order to image it. You know, um,
08:41
you're gonna mirror image a two terabyte system you will need around 23 terabytes. A swell.
08:48
The recent, Eunice, I say you need this much even know this images are compressed. It's because you have copies of them. You're gonna have the original. You're gonna be saving different versions of it, so you might need a little bit extra.
09:01
So
09:03
taking into consideration, it's bearable. And I'm gonna say 20 gigabytes to fool us. You could just practice in your ram.
09:09
Ah, sift
09:11
right. It's the other one and see if it's actually from Sands and it's also emits.
09:16
And
09:18
I would say it's also very similar requirements. Ah, they don't actually list here how much is needed.
09:26
But I haven't installing my system. And I think you know, you recommend four gigs of RAM
09:31
type of approach very similar to what's Lookit mention right.
09:35
I'm sorry. This is It's here and in storage here. It's the 20 gigabytes Plus,
09:43
Therefore, we're gonna copy this same details here
09:46
and copy them for sift
09:52
and the last forensic tool. We have his oxygen or less. So let's look for that Roque with now. One thing I like to do is type forensics literally in it. Our way
10:05
requirements, right.
10:09
You can get a more detail
10:11
information about it. You don't wanna have oxygen type of. You know what we breathe. Tougher thing ready.
10:18
But let's just click here
10:20
and let's see if it's still free. Um, not at all in one solution on that seep rocks,
10:30
huh? Say detective.
10:35
And to be honest, it looks like they don't have anything more free. So I apologize for that.
10:43
You know, we were building this application list life that what you know, howto build him when we picked random tools. Therefore, this list can be off dated or it can be very specific details that are free and not and paid versions and oxygen forensics. One of those star. Actually, the viewer is the only
11:03
license that's free.
11:05
And it's not that their friend, I guess from, you know, going to f decay image. You're free, right? Therefore,
11:11
you know, it does have a couple of things that can do for free, and it's very good Harbor. Let's stick to the core products are fully version and use those instead. Okay, Learn so far is that many of these tools such a i. P s on the
11:30
are integrated. As thing in our list
11:31
is installing sent us now, centers will be our territory tool. You can also install many windows, but however, Windows does requires a license and therefore you might be required to install an honest all many, many times in order to compensate. Our Santo's is free, and it's
11:52
sort of a burying a friend hat.
11:54
And here you can have, you know, six version require you no comment line will give a memory
12:01
and, you know, 20 weeks of hard drives. So
12:03
percent is
12:05
you got 1/2 you know,
12:09
I'm gonna say sent us here.
12:13
And let's say
12:15
to Kwan Core,
12:16
it doesn't say how how much
12:18
multi court is always better.
12:20
Let's say one give out of RAM
12:24
and is it doesn't say
12:26
how much to recommend it. Let's say
12:28
Let's keep it the same
12:33
the more, the better.
12:33
And 20 gigs since its OS, let's say it's 20 gigs.
12:39
No,
12:43
sorry for typos.
12:46
However, Remember, thes will be directly related if you run some of these other tools a swell. So taking consideration does when calculating These are here.
12:58
All right. And you gonna foot here windows
13:03
and you can see nice and space.
13:07
It's a 30 day trials. Believe there are.
13:11
And that kind of wraps up Really all we need from this list. If you go back to the list, we have to bear to me. She's of the where proxies. You have a yes, A Saiyan firewalls into the main controllers. You have the validity scanners, intestines, tools and forensics, right So what have we learned today?
13:31
We look at the different requirements for ideas. Polluted scanner to make Charlie s secretary.
13:37
Now, something is really important is that you won't not have life pen testing vulnerable systems in the network. That is a big no no. And I cannot stress this enough. You don't want
13:50
vulnerable systems in your network. Actively, on it's something would have happened. Someone else that's visiting you clicks in a mile where, while they're guessing your network, you can lose information. You could have run somewhere, et cetera.
14:05
Don't play with this
14:07
type of wrists. Okay, so
14:13
I hope to see you soon. In our next lesson, we'll start digging into the systems were sort of looking at the different details. We're going to start installing them at cetera, et cetera.
14:22
Sees him

Up Next

Building an InfoSec Lab

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

Instructed By

Instructor Profile Image
Kevin Hernandez
Instructor