1 00:00:00,650 --> 00:00:06,140 And, of course, will use Windows machines as our targets of our attacks and you know the reason, 2 00:00:06,140 --> 00:00:06,440 right? 3 00:00:07,040 --> 00:00:09,170 Windows are the most common operating systems. 4 00:00:10,320 --> 00:00:14,100 One of the Windows targets will be Windows XP service pack one. 5 00:00:14,610 --> 00:00:20,350 Now, it's not designed to be vulnerable, but, well, it is naturally a vulnerable system. 6 00:00:21,030 --> 00:00:22,990 It's not an up to date system. 7 00:00:23,310 --> 00:00:24,770 A lot of patches are missing. 8 00:00:24,780 --> 00:00:29,730 And as you probably know, too, Microsoft does not support this operating system anymore. 9 00:00:30,810 --> 00:00:36,480 Another target system that uses Windows eight, it's an up to date and modern operating system. 10 00:00:38,620 --> 00:00:43,390 Now, just so you know, I have to point out that Microsoft Windows operating systems are commercial, 11 00:00:43,420 --> 00:00:44,440 they are not free. 12 00:00:45,410 --> 00:00:51,860 You have to have their license to use now if you have any windows, so you can install it as a virtual 13 00:00:51,860 --> 00:00:52,340 machine. 14 00:00:53,120 --> 00:00:57,440 Just follow the steps that I showed you in the lecture of the installation of Kali, the light from 15 00:00:57,440 --> 00:00:58,400 the ISO file.