Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,270 --> 00:00:03,360
Now that you've seen that you might be thinking wow that was too easy.
2
00:00:03,660 --> 00:00:06,540
That's all it takes to install and remove packages of Linux.
3
00:00:06,540 --> 00:00:09,140
I don't even have to go to the Internet and find them.
4
00:00:09,280 --> 00:00:10,840
Just find them for me.
5
00:00:11,280 --> 00:00:11,610
Yes.
6
00:00:11,610 --> 00:00:16,070
Is that something that you might notice wondering but what do these packages come from.
7
00:00:16,260 --> 00:00:21,660
How does candy or anything else for that matter know where to go and look for these packages.
8
00:00:21,880 --> 00:00:28,380
They look in something called depositories and depositories are storage locations from which your software
9
00:00:28,380 --> 00:00:30,960
packages can be retrieved and installed.
10
00:00:31,790 --> 00:00:37,360
So Gadi for example or Debian or anything else for that matter it would have the most storage location
11
00:00:38,590 --> 00:00:46,030
once you issue the ABT get command your Linux box will go into that location try and find the package
12
00:00:46,100 --> 00:00:49,930
and if it does it will download it and install it for you.
13
00:00:50,710 --> 00:00:57,310
However sometimes you try to install the baggage and Kelly can't find it and the default repositories.
14
00:00:57,400 --> 00:01:02,320
So what do you do first let's have a look at what these things look like.
15
00:01:02,320 --> 00:01:05,510
They're usually on the EDC slash AP
16
00:01:10,650 --> 00:01:16,740
and these are the two you are as are the two locations where you can go and find the packages that I
17
00:01:16,740 --> 00:01:18,240
want to install.
18
00:01:18,390 --> 00:01:22,210
You could actually master this using your web browser.
19
00:01:22,260 --> 00:01:24,500
Let's say I want to update my system.
20
00:01:25,180 --> 00:01:32,040
I can do that using the EPG get update.
21
00:01:32,210 --> 00:01:34,900
Now that will take once or just speed things up a bit.
22
00:01:39,480 --> 00:01:44,050
Now ever want to do a full distribution upgrades I can do that.
23
00:01:44,070 --> 00:01:46,140
Apt get upgrade.
24
00:01:52,160 --> 00:01:53,030
See all of that.
25
00:01:53,060 --> 00:02:00,320
These are all software packages that will be upgraded if I continue with these commands.
26
00:02:00,600 --> 00:02:05,870
Is poor exploitation of the compromise Linux host.
27
00:02:05,980 --> 00:02:12,010
Chances are that you won't get non-truth access and you want to find a vulnerability that will give
28
00:02:12,010 --> 00:02:13,900
you access.
29
00:02:13,900 --> 00:02:19,140
This usually involves finding and exploiting vulnerable software.
30
00:02:19,170 --> 00:02:25,860
You might also come across situations where the Linux box you broke into is not connected to the Internet.
31
00:02:25,890 --> 00:02:28,410
Let's say you're unethical engagement for.
32
00:02:28,500 --> 00:02:29,770
I don't know a bank.
33
00:02:29,940 --> 00:02:35,490
They invite you to come in and plug into their internal network as an employee and see if you can hack
34
00:02:35,490 --> 00:02:37,450
anything on that internal network.
35
00:02:37,980 --> 00:02:42,690
You managed to get into a Linux box and you find out that it's not the next to the Internet when you
36
00:02:42,690 --> 00:02:48,420
still want to use it as a stepping stone to try and get to other systems.
37
00:02:49,500 --> 00:02:54,250
To do that you need to install some packages on it but it's not connect to the Internet that's off line.
38
00:02:54,630 --> 00:02:58,770
So what do you do in this case for both situations.
39
00:02:58,950 --> 00:03:04,440
You could use the package commands and this is useful in multiple situations.
40
00:03:04,440 --> 00:03:10,680
Sometimes software cannot be found in depositories Nessus for example if you try to install it using
41
00:03:10,680 --> 00:03:14,660
the ABC get commands you will not be able to find it.
42
00:03:14,760 --> 00:03:20,460
You'll find that on the Nessus website and you'll notice that it ends with a thought that the the the
43
00:03:20,460 --> 00:03:28,530
extension which means that software for Linux Debian unlike FBD However we need to know that the package
44
00:03:28,530 --> 00:03:31,090
does not take care of the penances for us.
45
00:03:31,110 --> 00:03:36,930
So if a package needs and dependencies we'll have to take care of that ourselves to get back to the
46
00:03:36,930 --> 00:03:43,770
Xenogears that we've discussed in our both exploitation to find versions of installed applications and
47
00:03:43,770 --> 00:03:48,580
hope that you are going to want an all out dated vulnerable one.
48
00:03:48,750 --> 00:03:54,980
You can do that using the deep package minus and commands to install the package.
49
00:03:55,140 --> 00:03:57,330
Let's say I want to install Nessus for example.
50
00:03:57,330 --> 00:04:03,080
After downloading it I can do that using the package minus my commands.
51
00:04:03,470 --> 00:04:04,870
And to remove the baggage.
52
00:04:04,920 --> 00:04:09,320
You can do that using the package minus commands.
53
00:04:09,360 --> 00:04:13,280
Now you might be wondering what I just said that the Linux system was off line.
54
00:04:13,320 --> 00:04:18,580
And how am I saying that I can install Nessus after downloading it.
55
00:04:19,110 --> 00:04:24,720
That's going to be for another chapter in another chapter we're going to be learning how to download
56
00:04:24,810 --> 00:04:26,980
stuff on our Candy machine.
57
00:04:27,390 --> 00:04:34,890
And then how we can use our Gadi machine as a server to upload stuff from our galley to the victim machine.
58
00:04:35,510 --> 00:04:41,370
Now let's not worry too much about it let's just assume that you somehow managed to get the Nessus package
59
00:04:41,400 --> 00:04:42,740
on the victim machine.
60
00:04:43,020 --> 00:04:48,240
And you can use that package command to install and remove it.
61
00:04:48,240 --> 00:04:52,470
Now remember these are all situations that happen in ethical hacking engagements.
62
00:04:52,470 --> 00:04:57,330
Having said that and I think that having an agent you want to make sure that you have the permission
63
00:04:57,570 --> 00:05:02,330
to install and remove softer off your clothing on the machine.
64
00:05:02,670 --> 00:05:11,280
So mission for the section on your Gadi machine install files ilah on your Windows machine activate
65
00:05:11,360 --> 00:05:12,370
FTB.
66
00:05:12,450 --> 00:05:13,850
If you don't know how to do that.
67
00:05:13,890 --> 00:05:19,050
We explain that in our hacking for beginners course go there and he knew that section on hacking for
68
00:05:19,050 --> 00:05:24,590
beginners and using structures on those videos activate FTB on your Windows machine.
69
00:05:24,870 --> 00:05:31,180
Then from an open file Zilah and next year is over on Windows.
70
00:05:31,190 --> 00:05:34,650
So I had to upload and download some files.
71
00:05:34,860 --> 00:05:40,400
Then on your candy machine download and install Nessus.
72
00:05:40,620 --> 00:05:43,430
Once you're done we can move onto the next section.
7794
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.