Welcome to Cyber Harry. I am Raymond Evans. I will be your subject matter expert for cyber areas, Web at penetration, testing course. In this video, we will be discussing environments set up. So what will we covered? We're gonna be talking about what? To download howto install instead of pure Callie to box and the pen tester labs and how to set them up. So what to download?
first, you're gonna want to go to the offensive security dot com's website
and download the newest image of Kelly. You could also go to the Cali website and download from there. However,
it's best to download the
image that they have rather than I. So because sometimes I so is act funny when you try to install them. So
let's go. Ah, let's go. Look at what I'm talking about.
All right, so here I am
on the calendar page and you'll see these different I So images here
Now you're not gonna want to download them. What you want to go and want to do is good under the Cali virtual images
go to that page. So we already have it up here
and you're gonna want to download one of these VM images so
they have a pre built Callie V Emma image VM wear image than a virtual box image.
software you might be using to run your virtualized environment if you have a preference preference, go with that
virtualized environments software.
Next, we're gonna download VM wear player, so just go to the VM, where website go to the downloads and you'll be able to find it there. You can also just type this link in here and go directly to it. So when you're downloading your Callie to virtual image, if you decide to use VM wear player,
download the VM Wear player version of the Cali virtual machine image.
And if you go to that link, this is the page that you will see.
So if you have Windows or Lennox you're choosing,
download the appropriate software
and finally, pen tester labs environments. You want to go to the pen tester, lab dot com website,
forward slash exercises and any environments that we may be coming across in this course that that's where they will be located. At next. We're gonna go on to howto set up Kelly, too. And it's also suggested at this step that you download the Iraq and I tool from
the this link here. Now do this download from your virtual machine.
Do not do it from your Windows or Lennox desktop. Do it from your virtual machine. So the tool is on your Callie box.
and we've downloaded the Cali to virtual machine image. So what we're gonna d'oh
or unwritten. Whatever software you're using to decompress it,
All right, we have the files, fully extract it. Now,
and you're simply going to click on the V M X file.
Now I have a fully functioning copy
It was the default credentials for any Callie image. So if you downloaded a different Kelly image, credentials will be route and T o. R.
And when she come into this environment
going download that Iraq and I tool that I had told you about, you will need it for further
Next, you're gonna need us up a pen tester. Lab pen tester Labs are really, really simple because the pen tester labs will actually unpackaged everything for you.
And there's only minor things that you're gonna have thio change such as your i p address inside the lab. So
let's go check that out, Roque. Okay.
All right. All right. Here we are in the VM wear workstation,
and you're gonna want to create a new virtual machine.
You're gonna create a virtual machine from a disk image file.
So let's select secret life to shell too.
You go. I want to name it something that you're gonna remember select how much disk space you wanna allocate to it.
environments are awesome because they run through and set everything up for you. And all you have to do is change the i p configuration.
All right, so we're gonna do a simple
And the I p addresses 192.168 out 101.1 30. You're gonna do it. I have config. 192.168
0.1 dot 11 because or whatever network you're running on myself. I'm running this virtual environment on a 192.168 dot 1.0 with a siren notation of 24.
So I will add a side of notation 24 here
says, air fetching interface device not found.
That's because we need to do I have config
eats zero because we are
saying which interface we want
and it says permission denied
because we're not root, You can't do that. So what we're gonna do is type pseudo
with us doing is saying, Hey, run that last command that I asked, but do it and
with pseudo permissions
So now let's go over to our Lennox environment
s So here I am in my Lennix environment
and what we're gonna want to make sure
first on our VM wear here,
environment is we want to go to players the player have appear,
could've managed virtual machine settings,
and you're gonna want to go to your network adapter and you're gonna need to change this to V. M. Net one host on Lee. It's very important to do that because if you're running this vulnerable, vulnerable environment and
There's somebody on the network outside and they're skinning your network, and they see that they potentially use that as a way of trying to get into your network.
And also, you want to be on a V M. Net
one local host for all of this stuff. Because
if you are doing something in Cali, Lennox and you are
sending a sequel injection or cross a scripting or running sequel map against a
you want to make sure that that is on a network where nothing else going it touched. And by doing V m Net one, nothing else will get touched. You are safe, your
good to fire way, all the crazy packets that you want. So now we have that on that environment
So we're gonna open up the terminal hero quick, and we're gonna do a quick ping check.
Honore. It can see it.
So now it's open up ice weasel
and simply type 192.168 dot one dot
Check my I p configuration here. Oh, there we go. Came up.
So here we are. We are now on that vulnerable web page, so That's how you set up those virtual machines, and that's how you network between, um and ensure that you're able to communicate.
set up your sequel injection to Shell environment, as I showed you, and also set up Web for pen testers as well. So it was covered. Talked about what to download, how to install Kelly, too,
how to run the pen tester labs and do a little networking between the both of them,
so happy hacking everyone.