Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back to the summary course in building You're in for a sec lap. I'm your host and instructor Kevin Hernandes.
00:07
In a previous lessons we've been installing RR in Siam Variance. We looked at curator Splunk and specifically in our last lesson
00:16
in a corporate environment. This is the tool where all the different lock sources, from firewalls to data loss prevention tools, will send their luck suit. So correlation happens within its engine and we can have a more General Overby. Oh, what's occurring in our network.
00:32
In today's lesson, we'll be installing Cow Lennox, a pen testing operating system developed by Offensive Security.
00:39
Callie is a well known system throughout the information security field that is adopted by many experts. And if you look for information security lapse, most likely you'll end up in a county lap configuration rather than security engineering.
00:53
You know, let's get started
00:55
one of the most if not the most popular
00:58
pen testing tool, an ethical hacking tool. It's Callen medics.
01:03
It doesn't mean necessarily that it's the best. Out there, however, is the most recognized, and the one with the most following
01:10
the vegetable is that is completely free. So let's Go ahead, Dello Catalina. Nick's here.
01:15
You have different variants. 64 vics, 32 bits. You see you have photo HDP version in a torrent version. Therefore, you don't have to go through any of insulation. Just download the image
01:26
and spin it up in your being where? So let's go ahead and try that.
01:32
Here we go.
01:33
Offensive security.
01:34
We start the people that produce we suffer.
01:38
You see you have poked BM where remember toolbox images into scarce so's E S X. I is part of being where we're gonna download that version. However, we're gonna run these inner personal computers.
01:51
Go ahead, Cal. Indiana's field where 60 forbid sentence it.
01:57
So the seat's E seven or 70 Sorry, it's basically let it require 77
02:02
to UN compressed
02:05
and let's look into seven. Several quick area 70 is basically a free archiving toe.
02:09
Now all you have to do, really it's click download,
02:14
and that's pretty much It was pretty simple.
02:17
You can see it's right here,
02:21
and the thing I like about seven sip is that, for example,
02:24
the thing about seven sip this fear right click and extract all. It will probably use the windows compared until, however sensitive
02:32
actually drop down into its menus and extract files here. One of the things that like is that if you add it to archive
02:39
right, you can actually pass her. Protect this with a yes to 56.
02:45
Not only that, you can also break this into smaller chunks files if their sights limitations in whatever you're trying to transfer
02:53
really good tool, especially for the cough.
02:58
Now let's go ahead and give Caroline. It's a chance to down the killing in existence. Downloaded. Let's go ahead and extracted. Sense it.
03:07
Okay,
03:08
let's wait for the process to finish.
03:10
What I like about this is it's already pre configured preinstalled. You have to do anything. I cannot say that enough.
03:19
You can save so many headaches, even though this software itself it's not complex.
03:23
All the tools
03:25
are not as friendly as this one.
03:28
Therefore, I really appreciate this,
03:32
and here we are,
03:35
fully don't load it right here.
03:38
You can see it has a lot of information here.
03:42
Let's go ahead and pick up damage
03:45
right here.
03:50
Yes, you can see it's already loading, and I say I copied it,
03:55
and this is and my personal computer would be in where Player, which is completely free of cost.
04:12
And did he fault is Route s Usinor and the past for
04:18
is tour or T O. R, which is route backwards.
04:25
And here you go. There's this calendar. Nick's today's lesson. We're basically install Catholics within our box mentioned before. This is a pen testing tool
04:33
which will help us identifying and exploiting potential vulnerabilities within our network.
04:43
In our next lesson will sell our sift forensics tool and operating system as well.
04:48
I hope to see you soon. Have a great day.

Up Next

Building an InfoSec Lab

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

Instructed By

Instructor Profile Image
Kevin Hernandez
Instructor