Welcome back to the summary course in building You're in for a sec lap. I'm your host and instructor Kevin Hernandes.
In a previous lessons we've been installing RR in Siam Variance. We looked at curator Splunk and specifically in our last lesson
in a corporate environment. This is the tool where all the different lock sources, from firewalls to data loss prevention tools, will send their luck suit. So correlation happens within its engine and we can have a more General Overby. Oh, what's occurring in our network.
In today's lesson, we'll be installing Cow Lennox, a pen testing operating system developed by Offensive Security.
Callie is a well known system throughout the information security field that is adopted by many experts. And if you look for information security lapse, most likely you'll end up in a county lap configuration rather than security engineering.
You know, let's get started
one of the most if not the most popular
pen testing tool, an ethical hacking tool. It's Callen medics.
It doesn't mean necessarily that it's the best. Out there, however, is the most recognized, and the one with the most following
the vegetable is that is completely free. So let's Go ahead, Dello Catalina. Nick's here.
You have different variants. 64 vics, 32 bits. You see you have photo HDP version in a torrent version. Therefore, you don't have to go through any of insulation. Just download the image
and spin it up in your being where? So let's go ahead and try that.
We start the people that produce we suffer.
You see you have poked BM where remember toolbox images into scarce so's E S X. I is part of being where we're gonna download that version. However, we're gonna run these inner personal computers.
Go ahead, Cal. Indiana's field where 60 forbid sentence it.
So the seat's E seven or 70 Sorry, it's basically let it require 77
and let's look into seven. Several quick area 70 is basically a free archiving toe.
Now all you have to do, really it's click download,
and that's pretty much It was pretty simple.
You can see it's right here,
and the thing I like about seven sip is that, for example,
the thing about seven sip this fear right click and extract all. It will probably use the windows compared until, however sensitive
actually drop down into its menus and extract files here. One of the things that like is that if you add it to archive
right, you can actually pass her. Protect this with a yes to 56.
Not only that, you can also break this into smaller chunks files if their sights limitations in whatever you're trying to transfer
really good tool, especially for the cough.
Now let's go ahead and give Caroline. It's a chance to down the killing in existence. Downloaded. Let's go ahead and extracted. Sense it.
let's wait for the process to finish.
What I like about this is it's already pre configured preinstalled. You have to do anything. I cannot say that enough.
You can save so many headaches, even though this software itself it's not complex.
are not as friendly as this one.
Therefore, I really appreciate this,
fully don't load it right here.
You can see it has a lot of information here.
Let's go ahead and pick up damage
Yes, you can see it's already loading, and I say I copied it,
and this is and my personal computer would be in where Player, which is completely free of cost.
And did he fault is Route s Usinor and the past for
is tour or T O. R, which is route backwards.
And here you go. There's this calendar. Nick's today's lesson. We're basically install Catholics within our box mentioned before. This is a pen testing tool
which will help us identifying and exploiting potential vulnerabilities within our network.
In our next lesson will sell our sift forensics tool and operating system as well.
I hope to see you soon. Have a great day.