Welcome back to the cyber recourse in building your info sec. Clap your host on instructor Kevin Hernandez. In her previous lesson, we discussed a horror requirements for s sign, yams and wet proxies. We noticed that some of these tools, specifically that snort
and all sec were misclassified, and we're really more towards the ideas I PS type of tools. We also noticed that the Web proxy take a squid was more off integration into your current Santos insulation and therefore does not need additional horror requirements.
Overdose off the base offering system. Now it will put some a little bit of Henderson performance on the operating system, but it's not a specific insulation that will require you to create an image itself. Now, something else to consider also is that many of these tools
specifically ideas and i. P s already
part of next Gen. Pharrell's. And it is really important in this lesson,
as we will be discussing the horror record Mints for ideas i p SS validity scanners, domain controllers, yes, excite pen tests and forensic tools. Now this seems a lot of resources, but as we know from freres lesson, many of the ideas and I PS is already included in next Gen firewalls.
Therefore, this list is actually a lot smaller than it really is.
Now let's get started.
Now Let's take a quick look into our world file and you can see Sorry, Caught. It's sort of the only one who haven't really looked at and security onion.
So if you look for Suri kata,
you can actually go to hear the docks and go to insulation night
and you can see then
it's more of a package. You can install your own OS
right? It's not an appliance itself like curator and therefore even come here, you can see how to install it within Santo's,
and in reality you can install this.
We just have your wet minutes. Well, it doesn't have too much info when it comes to hardware requirements.
But as I mentioned earlier synced, we do have disintegrated into the next gen firewalls such as PF, since we can actually ignore this if you really want to.
But however less techno tw into our sheet
s mentioned previously, so this opener sheet
and in emergencies to be stay organized
and say sure ricotta right, and it can be
with incentives and just at that small detail over there.
And that should really
be the end of it. If you want to call it like that
now, the other one's being stored and old sec, right?
You have the same approach,
and you can just copy them like this
That's really it for I P s. That's why I didn't want to cover too much on it.
And therefore, let's go back to a document. And now we have, let's say, two birds machines s X, I write.
So let's go to E S X. I hear hardware requirements
And actually, in that same sheet, you saw how much you need it. You need to CPU course, and
Fergie divides less, actually search Ram,
Uh, forgive us, Ram or around eight, give or take
say much to course doesn't say the frequency, so it should be pretty good.
And we will actually go a little bit deeper into this. Yes, excitement in another video that I already prepare for you. So for virtual machines, fear version center, Yes, excite.
And you have four gigs of Ram
and it says to CTU course
to course. Give or take.
Of course. Your take. And
that's about it. That's why we're adding so much stuff
into this lesson s You can see
data. It's very minimal. And XXIII itself was having oh, model. So don't worry about having
this little details.
Not privileged scanners, Right? We have ness is
And we had open bus, right? The open bat itself. It's inside. Callie Lennox.
We're just going to say
and let's look. And missus,
these are the type of tools dead.
You're gonna have more in the offline type of approach. So you're gonna have it. Maybe in your own personal computer. Just around the scam from there is required. You can see it's a two gigahertz score.
Four to the ahead score.
Right. And you have forgets of ram, give or take eight recommended
and actually updating the sheet
right there was just out of the screen for a second.
And this is sorry. This is
talking about Penn. Tess, Let's give a quick look into that.
We're only gonna look at the Cali box.
So Cali hardware requirements,
and you can see 20 gives for RAM to the advice of more
one or two gigs of RAM and 20 gives a storage. And once, if you should be enough.
one gig. What does this mean? It's very low on resource is, and therefore you can actually run it in your own personal computer
That something has to be somewhere player. Or you can have. It s a dedicated machine, A swell. I personally like to have it in my own personal computer, so I don't have to be promoting into it.
everyone has their own favorite things right now. The last one we have to check. It's the forensics
And if we make sure you go here right. Contest.
Forensics. Search machines covered, covered, covered, right.
targets. We're not actually gonna put a targeted system of a little system in our network on lettuce Really acquired. So are highly recommend. Those are offline. Unless you're gonna be using them
or you can use online. Um,
tools are only system where you BP and with your computer and then just targeted them over there. So let's look att, autopsy and oxygen
s. So let's look at autopsy
You can see that it is both for Lennox on access
used Donald a SCIF file, et cetera. Right.
And here you have documents,
actually, Just literally types lookit harbor requirements. You can say it's a gigs of RAM
and something to consider. Um,
the amount of stories you need, It's directly related to what forensic work you're gonna do in other hands.
In other words, sorry. If you're gonna image a 16 gig
RAM system, right, fixing gift, a ram's own system, you need at least 2030 gigs in your system in order to image it. You know, um,
you're gonna mirror image a two terabyte system you will need around 23 terabytes. A swell.
The recent, Eunice, I say you need this much even know this images are compressed. It's because you have copies of them. You're gonna have the original. You're gonna be saving different versions of it, so you might need a little bit extra.
taking into consideration, it's bearable. And I'm gonna say 20 gigabytes to fool us. You could just practice in your ram.
right. It's the other one and see if it's actually from Sands and it's also emits.
I would say it's also very similar requirements. Ah, they don't actually list here how much is needed.
But I haven't installing my system. And I think you know, you recommend four gigs of RAM
type of approach very similar to what's Lookit mention right.
I'm sorry. This is It's here and in storage here. It's the 20 gigabytes Plus,
Therefore, we're gonna copy this same details here
and copy them for sift
and the last forensic tool. We have his oxygen or less. So let's look for that Roque with now. One thing I like to do is type forensics literally in it. Our way
You can get a more detail
information about it. You don't wanna have oxygen type of. You know what we breathe. Tougher thing ready.
But let's just click here
and let's see if it's still free. Um, not at all in one solution on that seep rocks,
And to be honest, it looks like they don't have anything more free. So I apologize for that.
You know, we were building this application list life that what you know, howto build him when we picked random tools. Therefore, this list can be off dated or it can be very specific details that are free and not and paid versions and oxygen forensics. One of those star. Actually, the viewer is the only
license that's free.
And it's not that their friend, I guess from, you know, going to f decay image. You're free, right? Therefore,
you know, it does have a couple of things that can do for free, and it's very good Harbor. Let's stick to the core products are fully version and use those instead. Okay, Learn so far is that many of these tools such a i. P s on the
are integrated. As thing in our list
is installing sent us now, centers will be our territory tool. You can also install many windows, but however, Windows does requires a license and therefore you might be required to install an honest all many, many times in order to compensate. Our Santo's is free, and it's
sort of a burying a friend hat.
And here you can have, you know, six version require you no comment line will give a memory
and, you know, 20 weeks of hard drives. So
you got 1/2 you know,
I'm gonna say sent us here.
it doesn't say how how much
multi court is always better.
Let's say one give out of RAM
and is it doesn't say
how much to recommend it. Let's say
Let's keep it the same
the more, the better.
And 20 gigs since its OS, let's say it's 20 gigs.
However, Remember, thes will be directly related if you run some of these other tools a swell. So taking consideration does when calculating These are here.
All right. And you gonna foot here windows
and you can see nice and space.
It's a 30 day trials. Believe there are.
And that kind of wraps up Really all we need from this list. If you go back to the list, we have to bear to me. She's of the where proxies. You have a yes, A Saiyan firewalls into the main controllers. You have the validity scanners, intestines, tools and forensics, right So what have we learned today?
We look at the different requirements for ideas. Polluted scanner to make Charlie s secretary.
Now, something is really important is that you won't not have life pen testing vulnerable systems in the network. That is a big no no. And I cannot stress this enough. You don't want
vulnerable systems in your network. Actively, on it's something would have happened. Someone else that's visiting you clicks in a mile where, while they're guessing your network, you can lose information. You could have run somewhere, et cetera.
Don't play with this
type of wrists. Okay, so
I hope to see you soon. In our next lesson, we'll start digging into the systems were sort of looking at the different details. We're going to start installing them at cetera, et cetera.