0:11
hello everyone welcome to Johnny n
0:14
YouTube channel this video going to show
0:16
you how to get K integrated into your
0:20
home network using vmw workstation and
0:24
also I'm going to show you how to
0:26
connect the Cali system to your Le adapt
0:31
on your host K Linux is a open source
0:35
Dian based Linux distribution which
0:38
has security tools can help you to
0:42
finish your cyber security requirements
0:45
such as penetration testing security
0:47
research fenic VAB scanning reverse
0:52
engineering it becomes industry standard
0:55
now for Security Professionals it's not
0:59
only a operating system it's also a
1:02
platform there a whole echosystem has
1:06
been built for the cinux this video is
1:09
going to be the first video to show you
1:11
how you can get it into your home lab
1:15
and then how you can start to work on in
1:18
the future I'm going to demonstrate the
1:21
more tools and the usage how to use c l
1:26
ninu release to complete certain
1:30
security relate tasks so now let's jump
1:37
it this is not the first calorie related
1:41
video I had quite a few videos
1:44
previously couple years ago five six
1:46
years ago to talk about uh ccus and then
1:51
talk about how to using C to2 pen
1:53
testing if you're interested on those
1:55
videos you can look back search in my
2:00
I do have a playlist for Cali you also
2:04
can find out from my channel and then
2:06
watch it from there but the list is
2:08
going to completely new series going to
2:11
start it for how to use cantic to
2:14
execute one scanning penetration testing
2:18
information galling those work keep
2:20
watching and then please subscribe my
2:23
channel to get more once there's a new
2:25
video post on YouTube
2:31
Kelly system has different version for
2:35
platform no matter you are using Mac
2:38
Linux windows or using hypervisor
2:42
virtual machines or different platforms
2:45
such on platform mobile or even the
2:48
cloud container base or live boot on CD
2:57
WSL for this video I'm going to
3:00
demonstrate using the vmw workstation
3:04
which you can get it through vmw website
3:09
it's free now for personal usage so you
3:15
vmw the search V workstation for
3:19
downloading I do have a video for that
3:22
if you want to see how the downloading
3:24
looks like how to find the download link
3:28
please watch my list video for that so
3:30
assuming you already have it installed
3:33
then what you need to do is just get the
3:36
virtual machine depending on your
3:39
hypervisor hyper V qmu virtual box V
3:44
then you can download related version so
3:47
I'm going to use M here for downloading
3:51
it probably take a while for finish I
3:54
will stop the video here and then then
3:56
come back continue for the installation
4:02
downloading take a while depending on
4:04
your internet speed it's a
4:07
3.4 almost 344 gigabyte file I 7 that
4:13
format you can extract
4:16
all then you will get whole vmw package
4:21
to load it into your VM Workstation
4:29
after a couple minutes waiting for
4:32
extracting all files into k- nist folder
4:38
uh you will see all files will extracted
4:43
and they will take 13.8 gig by space
4:51
drive what you can do now is you can
4:56
open this C Linux video
5:04
folder and then you can load it into
5:07
your VM workstation that's how simple
5:10
how easy you can get car Linux to run
5:13
you don't have to change anything the
5:15
memory processor hard disk network
5:19
adapter all has been set up the username
5:23
password also has been showing in the
5:26
list vm's description
5:29
let's launch it to see how it is looks
5:48
like the booting speed is really fast
5:53
in Kelly Kelly has username and password
5:57
and you should be able to log in just
5:59
just for your information at this moment
6:06
connection because we haven't set up our
6:09
wireless adapter to connect into this
6:12
calm so what I'm going to do is I'm
6:17
going to connect in this USB wireless
6:20
adapter to connect in to my VM host and
6:25
then then mount it into this VM
6:32
to make things much simpler and easier
6:35
I'm going to disable the wire the
6:40
first so I won't connect it once I power
6:44
down my VM so at this moment this
6:48
network adapter won't be able to work
6:51
in so you should be able to see this
6:54
icon here it's grayed out so that means
6:58
it's no connection here after system
7:01
booted up so I'm going to connec in this
7:05
USB Wi-Fi adapter into my host and then
7:09
let Mount into my Cali virtual machine
7:21
first not all Wi-Fi adapter can be
7:26
compatible with Celly so Kelly might not
7:29
have driver for certain Wi-Fi adapter
7:32
but the this one is using real tag chips
7:35
inside so it's I been testing it so it's
7:38
fully compatible so if you can find the
7:41
good ones I'll just make sure you have
7:44
real Tech chips inside of your wireless
7:47
USB adapter then should be automatically
7:56
supported so right away I pluged the in
7:59
so now you can see there's something
8:01
ProMed up on the screen so the VMV
8:04
detected there's a new USB device so
8:07
they were asking do you want to connect
8:10
to the host or connect to Wasing machine
8:12
so of course I'm going to connect him to
8:14
the Wasing machine the reason why I can
8:19
because in the settings I enabled the
8:24
USB controller so USB controller is here
8:30
way once you have a new USB device
8:34
plugged in they will ask you this option
8:37
so you can see here so this is real tag
8:41
a2.1 and W L adapter has been connecting
8:46
to the so other USB devic is connected
8:49
already on a host because I didn't plug
8:51
in as a new device so they won't prompt
8:54
it up for you to connect right away you
8:57
should be able to see a network
9:01
here it's still grade out the EET
9:06
disconnected the Wi-Fi network also
9:09
disconnected if you don't have Wi-Fi
9:11
adapter this option even don't show here
9:14
so at this moment since they already
9:17
detected the USB adapter and the drivers
9:21
has been loaded for this USB Wi-Fi
9:25
adapter since they know the chip and
9:27
then we should be able to see quite a
9:30
bunch of uh SSID available Wi-Fi network
9:35
so I'm going to connect into one of them
9:38
which I know so then you should be able
9:40
to put in password in here then you can
9:44
it now you should be able to have Wi-Fi
9:51
internet through this wi-fi
9:56
network now if you if you want to Wi-Fi
10:00
related fantasting or Wi-Fi related
10:04
tasks then you should be able to do it
10:10
here since this video is mostly for how
10:14
to integrate K nukus into your home naap
10:18
environment and connecting to Wi-Fi
10:21
network I won't demonstrate how to crack
10:24
your home Wi-Fi network password but
10:28
here are some command I can show you to
10:32
how to use it and then you can explore
10:38
GitHub project. p- dictionary which
10:43
should be able to give you more details
10:46
about that this kind of attack we don't
10:50
have to install all those packages in
10:52
cell or include and what we need to is
10:56
just to use it LO command in this GitHub
11:01
repository to hack your home network or
11:05
to crack your home network
11:07
password I put the command here already
11:10
but uh this should give you some basic
11:13
idea what you can do first thing of
11:16
course we have w l zero interface right
11:21
now since we connect it to our USB
11:29
after that you should be able to use
11:43
Mount to get your SS ID and then you can
11:49
which network you want to focus on so
11:55
we're going to try this Bobby Network
11:59
you got the BSS ID you got the channel
12:03
channel is most important thing we're
12:04
going to focus on this channel Bob is
12:06
here is on channel 10
12:09
so basically we going to start
12:19
into capturing a handshake
12:25
packet and that way stum because we
12:28
haven't put Network in a monitoring
12:32
mode so there's another command which
12:35
you can use is air ngng and then start
12:39
on just paste here we're going to start
12:43
the interface into monitary
12:46
mode you can see the chipset is real
12:50
Tech semiconductor Corporation chipset
12:53
RTL a192 CU that's the driver
13:06
now we got some WPA handshake package
13:12
here after you have enough handshake
13:15
information now you can stop if you look
13:18
at you should be able to get the
13:20
handshake d01 do capap file then the
13:24
last command is to get the password
13:28
dictionary and then we going to give a
13:30
try or you using BL Force using a crack
13:34
dng this command to Blue Force and
13:38
handshake to cap trying to find out the
13:41
password we're not going to present that
13:43
if you need a dictionary you should be
13:52
repository so there's lots of um
13:54
dictionary which you can download it to
13:57
use so all our dictionary are here so
14:03
them six mag you can download them in
14:07
put into your local folder and then
14:11
trying to Pro Force your w l
14:15
Network it hopefully you don't need to
14:18
take too long and you can get the
14:19
password using a correct CH but I'm not
14:23
going to demonstrate that in this
14:26
video uh you should be able to get more
14:29
information from online for that but
14:32
that's the whole idea how simple how
14:35
easy you can start in to use carry to do
14:38
the penetration testing or do the EIC
14:42
hacking I hope you get some good
14:43
information from this video if you do
14:46
just give me a thumb up and uh subscribe
14:49
my channel if you haven't never gave me
14:52
a great support thank you for watching
14:55
see you in my next video