Time
1 hour 44 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:00
Hey, everyone, welcome back to the core. So in this video, I just want to give you a high level overview of lab number two. So in this particular lab, you're going to be using the social engineering tool Could again. You're also going to be creating a smeared site, so you'll be creating basically a fake Twitter site.
00:17
Keeping in mind that this is gonna be a very, very rough version of it. It's not gonna be exactly looking like Twitter.
00:23
And then you'll also be downloading a browser based tool for Mozilla Firefox. So just keeping that in mind. One thing to mention here is you want to make sure that you turn on all the virtual machines as you're about to do this lab. The way to do that, if you're not familiar with it, is to simply hover your mouse over top of the machine
00:42
and you'll see a power on option.
00:45
Now, with this being technology, sometimes you might run into issues where it doesn't boot up. So if that's the case, you can use the refresh option, and that will normally kick the device into gear. If you're still having issues, please reach out to the cyber support team and will be happy to take a look.
01:00
The other thing I want to mention, just like with the other lab in the resource section of the course, there will be a step by step guide for this lab. However, there are also instructions here on the left side that will walk you through this particular lab.
01:17
Now, you noticed in the other lab as you progressed through the different steps in the lab, you had to check a box to show your progression. In this particular case with this lab, as you go through the steps
01:29
and complete them, you simply have to click the next button once your complete with this particular page, for example,
01:37
and the system will automatically log your progress in the lab.
01:41
So just one key difference there with this particular lab. Lab number two. You don't have to manually select a check box to save your progress in the lab. That will automatically be done for you as you progress through the lab.
01:55
So, as always, if you have any issues with the lab, it all of you have any questions. Feel free to reach out to the cyber support team
02:01
and we hope you enjoy the lab

Up Next

Social Engineering

In this course, students will learn about different types of social engineering attacks and gain hands-on experience in two labs using the Social Engineering Toolkit (SET).

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor