filmov
tv
Create your own Hacking Lab and Hack your first Machine! (Disposable Kali Linux)
Показать описание
If you are trying to learn Cyber Security, Ethical Hacking, and Penetration Testing (short for pen-testing), you need to get your hands dirty by hacking your way through intentionally vulnerable applications. To do this, you will need a "Hacking Lab" or a "Pentesitng Lab" which is a machine that has all the tools required to perform pen-testing.
In this video, I show you how to set up your own disposable personal Kali Linux Hacking lab, and then I also teach you how to exploit a vulnerable machine from TryHackMe.
We use a concept called Docker Streaming to set up our Kali Linux Lab. Docker is a technology using which we can spawn up isolated containers of different apps. Docker Streaming allows you to stream these isolated containers directly to your web browser which enables you to use any app you want from your browser itself! We will make use of an awesome Docker Streaming Platform called Kasm for this.
You can install Kasm Workspaces Community Edition absolutely free of cost, on your Linux machine.
And don't forget the challenge! It's your task to escalate privileges to the root user on the vulnerable machine. Good Luck!
Don't just watch the video. If you really want to learn something, go ahead and try it yourself.
Thanks for watching!
SUBSCRIBE for more videos!
In this video, I show you how to set up your own disposable personal Kali Linux Hacking lab, and then I also teach you how to exploit a vulnerable machine from TryHackMe.
We use a concept called Docker Streaming to set up our Kali Linux Lab. Docker is a technology using which we can spawn up isolated containers of different apps. Docker Streaming allows you to stream these isolated containers directly to your web browser which enables you to use any app you want from your browser itself! We will make use of an awesome Docker Streaming Platform called Kasm for this.
You can install Kasm Workspaces Community Edition absolutely free of cost, on your Linux machine.
And don't forget the challenge! It's your task to escalate privileges to the root user on the vulnerable machine. Good Luck!
Don't just watch the video. If you really want to learn something, go ahead and try it yourself.
Thanks for watching!
SUBSCRIBE for more videos!
Комментарии