 Tom here from Lawrence Systems and this is a Raspberry Pi 4 With nothing on it. So it's not interesting yet We're gonna make this a much more interesting Raspberry Pi 4 and the goal of this video is to show you how to get started with Kali Linux as a Reconnaissance tool now the business use case for this is you want to be able to take something that's relatively inexpensive I mean I could just drop my laptop off at a clients But I'd miss it and I like this laptop and it costs a lot more than this Raspberry Pi And if you have a client where you need to do some assessments you need to do some discovery you need to Be able to access their network easily without modifying firewall rules because this is kind of an initial When you're working with clients or sometimes you you know don't have access or have not changed out the firewalls and got everything set up So you want something fast and easy to deploy? That's what this is We're gonna show you how to load Kali Linux We're gonna show you how to set up X to go on a Raspberry Pi 4 running Kali Linux And we're gonna top it off for remote access with zero tier now I've done some in-depth videos with zero tier But I'm gonna cover the basics here and how to get it set up how to join your computer to the network And once you have it joined to the network with zero tier it doesn't really matter where it is That's kind of the whole fun part of how this works is no matter where you deploy this It doesn't need any extra firewall rules changed on their network as long as the Raspberry Pi can get internet It'll go out to zero tier it'll get connected and then you can connect it even if their IP address changes It doesn't matter it's going to work and that's what we're gonna walk through today So let's get started but first if you like to learn more about me or my company head over to Lawrence systems calm If you like to hire short project There's a hires button right at the top if you like to help keep this channel Sponsor-free and thank you to everyone who already has there is a join button here for YouTube and a patreon page Your support is greatly appreciated if you're looking for deals or discounts on products and services We offer on this channel check out the affiliate links down below They're in the description of all of our videos including a link to our shirt store We have a wide variety of shirts that we sell and new designs come out. Well randomly so check back frequently And finally our forums forums.laurancesystems.com is where you can have a more in-depth discussion about this video And other tech topics you've seen on this channel now back to our content Now as I mentioned raspberry pi is relatively inexpensive We're doing this on a raspberry pi 4 4 gig started kit this technically would work probably on a raspberry pi 3 But hey the 4 is out and it's relatively inexpensive And this whole kit including the sd card and a fan and heatsinks that I put on it Is all of $99. So this is a pretty expensive pretty inexpensive box Especially compared to my laptop and it does run kelly linux perfectly fine Now what is or where do we get kelly linux kelly linux by offensive security is a really great linux distribution Which i'm so happy they've really got well maintained arm versions of as well Not just x86, but arm versions that work on things like raspberry pi It's basically an all-in-one Linux tool kit with lots of great tools on here We're really just going to scratch the surface when it comes to doing reconnaissance and just show some of the basics On here towards the end of the video, but at least it'll get you started if you look for any other Things on kelly linux you'll find it's a really amazing tool set on there for doing not just some basic reconnaissance But even some advanced from mobility scanning road access and maybe some you know Real pen testing you could do all from this box, but this at least will get you started with it Now we have here the different images You should be able to modify my instructions here to work with one of these other systems if you want Specifically though, we're going to download kelly linux for the raspberry pi the 64 bit one right here Now how do you get it on there that part's pretty easy? And basically if you're running it on linux like am you can just get this image file and copy it to the sd card Now this kit that i referred to comes with 32 sd card That's actually plenty for what we're going to be doing at it It really doesn't take up a lot of space to get this loaded Now in case you're running windows i'll leave instructions on this right here There is an instruction for making kelly bootable on a usb drive for windows And it shows how to use this tool here called etcher, which is free So all of this doesn't cost anything in terms of the software wise once you have the hardware everything else is just your time It took to learn this so it's only you know expense so to speak that you're going to be putting into this So you can get the free etcher tool burn it to or flash it to i say burn because i think of cds But you could just flash it to the drive and they have the instructions here now one of the first steps So once it logs in is going to be this right here And we're going to talk about that because housekeeping is important Especially when you drop these things off and what you don't want to do is load this up with just the default image and Drop it off because it's got the default username of kelly and password of kelly along with Predefined keys on it which would be easily accessible by someone else if they wanted to take it over So when i talk about the housekeeping part don't kind of skip over it because you want to jump ahead Do take the time to do that because sometimes these get dropped off at clients And maybe you're trying to do a discovery and maybe they have a threat actor on their network And now you just gave them a tool in the middle of their network with default credentials So before you ever deploy these in any environment, please do the little housekeeping steps And we're going to jump into those next now assuming you did everything right and you flash the system Flashed a little sd card. This is what your boot screen should look like if you have an hdmi plugged into your Raspberry Pi So pretty straightforward. It's going to go through it boots up And we're going to get a login prompt and a graphical one at that in just a moment All right. Now we're at the login prompt now from here. We're going to type in kelly And we're going to type in kelly again, which would be the default password I already changed it. So yes, I did type in a longer password And now you'd be into the ui now, that's fine. And from here you can open up a terminal You can look up your ip address. Um, I already know what the ip address is Is I seen it register on the firewall and looked at the thtp table So I know what the ip address is and we're actually going to go and ssh into the box That's the way I'd prefer to do it from here on out and manage it And we're going to show you how to get back to the graphical ui because ideally if you're deploying this At a clients, you're not going to have an hdmi and an easy access to it So we'll switch over to ssh and then show you how to get back into the graphical part from there Now as I said, I already know the ip address. So we're going to ssh in kelly at 192 1683 Dot 180 that was with my firewall Handed out as an address to this through the network interface. Well, technically before I ssh in I usually do ssh copy id Now this is another assumption and you can you know pause right here I don't have a video on this but you can go look up how to generate ssh keys If you do this with ssh keys, you're going to be that much more secure This is something I recommend doing but if you did want to just use username and password to log in That is completely possible and you can kind of skip this step But if you do ssh keys, it's that much more secure because no one can brute force an ssh key the same way Or as easily I should say as a username, password combination So we'd copy our id it would prompt us for a password It copied my ssh keys over to the kelly linux install because I already had them on here It didn't prompt me for the password again. But once you've done that You can just go here then and ssh in And you're in now housekeeping As I had mentioned right here sudo rm Etsy ssh ssh host then sudo dpackage reconfigure open ssh server and restart service Now the reason you do these is so you can Go in and delete those static keys that were generated that come as the default keys on all of these instances So we've got go over here. I'm not going to run those commands as I ran them But just take the time to do those right there the next little bit of housekeeping is provided you installed your ssh keys is sudo Vim or your editor of choice if you're preferred nano, I highly recommend learning vim. It's worth the time ssh ssh dconfig Don't forget the sudo and right here the default is password authentication. Yes, and we added password Authentication. No, please note that p and a are both capitalized. What that means is that only Keyed authentication can occur So we can log in with a key, but there is no way to log in with Username password before you do this and before you change that setting do make sure that you can log in like I did and that it can be Passwordless login through the keys like this. So ssh kelly and it logs in do that before you set it once You know, you have the keys working then set it in a way you go So that part is done as far as ssh keys You've cleared the old ones you've now if you've done this properly you have your ssh keys installed So you can easily just log right into kelly. It's just just make your life a lot easier when you're setting this up Next step zero tier and zero tier is a really important piece of this I'll leave a link to this because if you go to the zero tier download page, you won't see listed exactly the different compilations for The arm processors, but they do have them They're just specifically right here and this is the one specifically you want to use that will work with kelly linux This is something i've covered in a previous video, but i wanted to make sure was uh, you know It's important that you get the right one This is the arm 64 and i'll leave a direct link to this in My forum post of each of these commands so any of the commands i type in here I will make a list of in the forum post so you can just copy and paste them in so you can get this file But this is the zero tier one arm 64 So we'll just do a quick copy link address And then we would just do a w get And install it now i've already downloaded this file But that's all you got to do is to get that file then you would do sudo d package pkg dash i And then you would do zero tier 64 dev This will install that particular package because this package is not available through your normal apt kits repositories That's where we had to download specifically the dev package But once it's installed we can jump right into zero tier as a matter of fact put sudo in front of it Because it's controlling things at the network adapter level. It does need sudo access zero tier cli Put in the that and now we can list the display. So let's say info It is online and ready. So how do we join a network? That's actually pretty simple So we're going to go over here to zero tier And this is my zero tier youtube testing network id And i have an entire video which i'll link to where i go in depth of all the amazing features that zero tier has But essentially it uses what they call udp hole punching So you do not have to open ports, but you still get access to your devices that are all on zero tier Even when they're on separate networks, which is obviously an important part if you want to take this To a client to do some reconnaissance So we go here to a network id and we're just going to copy it And we're going to go down here and we see my laptop is already in here And it's actually the only device in here. So then we go back over to the terminal And we want to zero tier we just type in the word join so sudo zero tier cli join And paste that in Join okay That's really it. So now if we go here zero tier peers We can see it's now joining some of the network. That's exactly what we want. So we can go back over here to zero tier again Wait for the page to refresh All right. Now it's showing up. So we're going to go here check the box And we'll give it a name of kelly pie And this one's actually going to go to my house for the testing so Uh tom's house. Whoops There we go. That's where it'll be for testing. Just go in there type it. It's saved now here Is the new ip address of it And what this does was zero tears it adds another network adapters another we're joined and we have an ip address We can go to ip space a And we can see That ip address and the zero tier adapter now from here on out We're going to start accessing this from this ip address. So if we go over here And we type ip a on my computer. We see that my laptop has a zero tier ip address of this But that means we can go here ssh kelly at And now i'm logged in via that ip address So no matter where I go with this raspberry pi or my laptop as long as they both have internet access They will start talking to each other over zero tier. So even when I move around with my laptop I don't have the vpn back to the office or anything like that I can just take this my laptop has internet And then i'll actually going to take the raspberry pi for the next part of this video We're going to take it to my house and get it over there so we can access it or anywhere else We take it and i'll always use that ip address zero tier statically assigns an address an id to it So it becomes unless you change it the address it always receives whenever it gets internet So no matter what ip address is handed from whatever network it's on it always has a backup So to speak a secondary i address that matches that zero tier address Now one last thing we're going to do though before we Get rid of this raspberry pi and put it on another network. We're going to sudo apt-get install x to go Server now i've already got it set up on here But there's really not much setup you just do apt-get install x to go server That was it That's all you have to do to get set up now I have a previous video there were a lot more instructions a new version of cali linux here in august of 2020 Is a lot More updated and didn't have to have any extras and that's going to give us the ui access we're looking for so We're going to we'll go ahead and test that right now and we're going to go over here We're going to go open up x to go Now i already added this as a new session with that same ip address But we're going to edit and show you what the session looks like Is you create it i called it cali pi there's that ip address because we're going to access it from its zero tier ip which is static Login username is cali ssh port is there try auto login via ssh keys Now the reason that box is checked is because with the auto login It's going to use my key files to automatically log in if you previously Didn't have your ssh key set up and you skipped that part earlier in a video Then no problem you if as long as you didn't disable password login You could put a username and password combination to log into this The last little piece you have to do is right down here The desktop that's installed is xfce you can install other desktops if you want But i found it xfce works perfectly fine So there we go xfce hit okay. There's really not anything else we need to do in here But click it for connection. It's going to use my keys my ssh keys So it's not going to prompt me for a password and it's going to connect here in a second Here's x to go And it's loading up a desktop session Now i can even leave i can open up things and leave this desktop session running something i can Kick off utility i can open up a browser We'll actually open up a browser right now and i'm browsing from that machine It's you know, basically a terminal or remote access to it So here it is because some of the kelly training docs and if we were to close this He'll take a second to close But we didn't log out Then we go back over here Go back in again And you'll see it'll be right where we left off So if you do kick off something you can use the ui to Be inside that network now another advantage of using the ui because this is Remoteed into another network right now. We're on the same network for the next part of the video We're going to put the raspberry pi somewhere else. I'll still be here in the studio But i'm actually going to drop it off at my house and when we do that We're going to still be able to get to the ui and everything we need to do So we still have access to any graphical utilities we want if we wanted to especially things like wire shark I find wire shark is a whole lot easier to use through the ui at least you know if you want to do a lot of Filtering and stuff like that. It's great to do it here. Oh, and if you're wondering why it's so small Don't worry. We can fix that. I just left it at the default 800 600 But yes, it will go bigger. So we'll close that now. We have wire shark if you wanted to use this Yes, you can use wire for shark from the command line I know someone may point that out, but we have full terminal access, but i'll admit Since you are looking at a terminal through graphics right here, which is okay I still prefer the command line here When you're in it because well, you can use things like tmux and then start a session start a process Leave disconnect close my laptop and still resume that session later I've got a video where I've talked about tmux as well But we're going to go ahead take this over to my house drop it off Show you how to get it connected and then we're going to do some scanning on it to show you how to create a network Enumeration report and kind of start diving into how this actually works and what it looks like in practice now that we've gone through the setup So it's the next day for you. It's just a jump in the video But for me it's tomorrow and I have my coffee because it's the morning and I have the raspberry pi installed Now all's I did when I took this to my house Plugged it into the network now a couple little things Make sure you have permission to scan a network before you go dropping off a raspberry pi That has not gone well for people who have without permission plugged into random networks So it is important you have permission and of course I have permission to do this because it's my house Second the only thing I did was plug it in. I didn't look at the ip I didn't plug a screen into it. I just turned it on with a network jack plugged into a switch So that's it. I don't care what ip address it gets because we have zero tier installed And probably within only a few minutes it popped up in zero tier from the time I turned it on to the time It was active and connected So as long as it gets an address and can get to the internet It'll then get to zero tier and then we can access it So we're going to switch over here and look at the zero tier control panel And we see my laptop is online and I've got my Office ip address blurred out, but I'm leaving public my home ip address, which is 6 9 14 103 125 So this is the kelly pi at tom's house and once again even though it's at a completely different location It still gets assigned the static address of 10 147 17 dash 94 so we'll switch right here ssh and to kelly at 10 dot 147 dot 17 dot 94 And we're in so let's look at what ip address it does have so now we can go in and look not that we Need to know except we want to do some reconnaissance So we see the eth zero is plugged into 192 1681 Dot 124 so we have nothing on the wlan We could always start scanning the wlan and start messing around with that if we wanted to as well If we wanted to you know, see what wireless networks We'll see that for another video But in terms of here's our zero tier connector has that same ip address Which allows us to get in which means even if my public ip at home changes because well it is dynamic I don't have a static one at home And if I move this to another network to do another reconnaissance Well, same thing. I just keep logging into the same ip address. This is kind of the beauty of how that works So now let's actually enumerate my network So we're going to go ahead and do that with Tmux first and why am I doing the tmux? Well, then we can close my laptop and move on I've got a whole video I'll link to about how to use tmux, but what tmux essentially allows you to do is detach and reattach from sessions and so We'll go back here tmux. I think it's l ls and it shows us that we have one tmux session running in the background And watch this if we exit And go back in That session still exists and let's reattach to it And the reason that's going to be important when we have here is because when I kick off this command It's going to take a little while. Well, not a little while for you I'll skip ahead in a video in terms of waiting for the enumeration to occur But I do recommend that you run this through some type of terminal session that way if you're waiting two or three hours If it's a large-scale network for something to complete that you're not You know just hold on I got to keep the session open because if the session breaks and you kick it off It may not complete But if you have it spawned in something like a tmux shell It's going to have no problem You can disconnect for it even if I abruptly disconnect from it It will automatically go back in and I can reattach that session and pick up where I left off And the processes I kicked off will keep running so I can see the results from them So let's go ahead and Use nmap to enumerate my network and I'm going to leave these commands once again as I said over in my Forums so that way you can just copy and paste them because there's going to be kind of a long command We're going to put in for this Okay, so here's the command we're going to use and there's a lot of different ones you can use with nmap But this is kind of a nice basic discovery script that we'll go through and as long as you have both nmap installed And the only thing you have to add because kelly comes with nmap has this xlst proc Tool apt to get installed at no big deal there and what this allows you to do is nmap dash dash script Discovery is a script you're going to run this is built into nmap We knew the network because we typed it ip space a and we've seen it was a 192 168 network So we'll say 192 168 1 slash 0 slash 24, which means scan all hosts on that segment of the network if dash x Oh report dot xml and then we have this what this says is once that's done and we generate report dot xml Then we want to run this tool against report dot xml. We're going to stick a date in front of it We're going to call it the tom house report dot html And what this is actually going to do is take a little while to run and give us a nice html report of all the hosts that discovers ports open and this is the You know real important step is the discovery of what hosts are on a network Especially when you're doing this for business purposes and you go. Hey, I got to start enumerating. What is on this network? What are all the devices? What are all the things that need to be taken care of or what are the random things that are open and Beyond scope of this particular test you can take the same nmap and this takes a little bit longer nmap has some basic vulnerability scanning Abilities so it can then take after you find all these ports Then you can maybe do a more intense scan on a couple devices for vulnerabilities and cbe's If you want to kind of keep drilling down into a network for discovery and you can all do it from the Strasbury pie. I forgot to put sudo in front of it. So I kicked that off and here's what I'm talking about So if I were to close this and we'll just go ahead and Close it real quick Then go back open up a terminal session make the screen a little bit bigger here for you ssh back in List out the sessions for tmux and we'll just do there's only one session. So we'll just attach Right where we left off. It didn't stop this from running So it's still digging through finding the mac addresses Doing some multicasting if there's anything ipv6 on there. So this script's going to take a little while to run But we're going to go jump ahead here in a second to it being finished All right, it took about 15 minutes for this to run and now it's complete So we now have our report xml and this right here, which is important the tom house report dot html Because while we can go here and we're going to go ahead and open up the report And it's got lots of data and it's all a nice xml format. So you can import into something It's still not pretty if you wanted to just easily have something that can be presented to a client or just for you to look at To get a nice pretty report now a couple things we can do one We could just grab that report and bring it back over to my computer and view it or as I mentioned earlier We have x to go installed and same ip address the kelly at 10.147 1794 We're going to go ahead and just open this up with x to go and part of the reason I put x to go on here So we can get to the graphical UI if you want to run tools like wire shark Also to show that it does work across internet connections and works quite well So I'm going to take a second to get connected and spawn the screen. It's actually not an internet speed connection It's how fast a Raspberry Pi can spawn a session because this hasn't been spawned before so it's not reconnecting to existing one There we go And we're going to go here There's the toms house report and we'll open up in a browser and show you what it looks like And we'll find all the devices on my network And there's a lot of things on my network well A decent amount of them I should say I know a bunch of them are chromecast So let's scroll down the report a little further ports that are open Flags it found uh, oh this is interesting it dug into quite a bit This little device that I have here, which is another Raspberry Pi. I've talked about that project running the MI so it's a Raspberry Pi camera system I have on there So it went and explored all the different Things you can do on there to tell me a lot about it One i2-168-106, what's this? HTTP chrono request times Interesting, so there's some of the ports that are open on this. I'm going to guess that's a chromecast But you have a lot of detail that you can start going through you have a good understanding of what's on this network now And what might be interesting to further investigate Now among these and let's actually scroll back up towards the top Because we're on that network. We can also start logging into them So let's see what else do we have here 192-168-1.4 or what else is there? Wow a lot of stuff. Well 192-168.1.8 Let's see what's on that one Okay, we got ssh open we got the ssh host key It found a lot of different assets that were publicly somewhat publicly available to start identifying what this is And it's a free NAS. I already know because this is my network But you can see how it really goes through and takes the time it starts diving into these Then from there we can launch further intelligence reports and start digging further into Everything on there and of course because we're on that same network 192-168-1.8 and we can start logging into things from this network So now we can start digging further playing with the ui's etc etc So it's really nice having the ui start really pentesting something and it's all easily available here and the same thing with the Sessions if I kick something off that's going to take a while and I well I'd want to close my laptop and move on We'll close this Now that the session spawn will just go ahead and Close that go back over here next to go And open it back up actually you want to change the resolution to Something a little bigger. This looks a little bit better Quit opening up at 800 600 reconnect to it And we're right where we left off We have the login screen that we left it off on and I can Pick up wherever left off or if I had something like and we'll pull up wire shark for an example again Maybe you want wire shark to keep doing something in the background Authentication is required but the authentication in And maybe we want to do some sniffing on this particular network or there is the option here So we have the a bluetooth monitor. So if there's bluetooth devices in the area you want to look at There's a lot you can start pivoting from and doing here and it's all facilitated of course because The zero-tier connection allows us well wherever this is or if their ip address changes No worries. This will always essentially have that same static ip address We can go into and even if it changes mid session the sessions will always end up at that same place So I can always reattach later even if it's a week later. It doesn't really matter Now the couple final things that you may want to consider that goes a little bit on the scope of this But it's something you can load on here are things like sync thing and you can use that same ip address So maybe you put a fleet of these out there and zero-tier does allow for free up to 100 devices So you could have a handful of these raspberry pies give them all nice names for which site they're at Then set up something like sync thing on there for each one of them And what that would do is anytime these reports are done You could then have it tied to whatever internal device you want this tied to such as my laptop and those reports can just show Up here. It's also handy if you have scripts you want to deploy that are common across all these You could always set up sync thing drop that script in there and then log in remotely to execute them And if you want to make this more automated I have a video on ansible as well where you could set up all these in a list with ansible And then you could maybe run the same scan modified it of course to match each network And build out different functions that way so you could say I want to run this command against these group of raspberry pies At these particular clients or just kick those scripts off at some type of interval that you want and then Have sync thing drop all the reports back over here when they're done You'll just see them show up and you'll have all your reports and you can even go further and automate You can see how this can keep building into a pretty well Rounded tool set for relatively inexpensive building out these sensors and having a dedicated sensor on a network like that Such as the raspberry pies obviously just helpful in general When you have to do troubleshooting because being able to pivot into the network like that Or have your browser at the ready because so many things, you know, whether it's a phone system Or really any other devices. These are going to be accessed by ssh Hopefully not but telnet's still out there somewhere and of course web browsers Many things have web interfaces on them But that is easiest access from inside that network now the last thing i'll mention and i have another video And i'm going to link to all these different spots i talked about so you can start with this and then pivot to all these other extras Is using a proxy chain So proxy chaining allows you to pivot into a network and we're going to do this over ssh And then bring your browser as if it's acting inside that network So we're going to do ssh my minus capital d 90 50 that's my proxy chain port and it's the same port i used in my video And then it's just the same kelly at 10.147.17.94 then from here This is tmux so i'm able to split the screen Proxy chains and we're going to pull something and what you're doing when you kick off something with proxy change You're wrapping it in that proxy chain. So we'll open up firefox So we open up firefox in that proxy chain And then we're going to go to 192.168 um We'll go back to eight for example Because now we're inside the free nas that's not my local ip address So if we go back over here, we'll even show my computers at 3.18 Now that we're local on my computer and i want to do something like ping 192.168 1.8 I can't do anything like that just doesn't work And if i were to open up a regular browser, it also won't go there proxy chains allows you to be inside that network But then pull it through a proxy chain back over to yours So now i'm at my local browser on my computer But it's chained to that particular raspberry pi which pivots and puts me inside that network And one of the other things that i have inside of here And i've covered this before i've mentioned mi which was something else that the Discovery tool found at 192.168 111 I can get to there And it will load this is actually my sump pump viewer. This is what i'm actually using that camera for nothing too exciting But it lets me know if my sump pump has water in it or not when it's the rainy season And uh, then if we want we can do an h e t p s One of the other discovered ports on that list was my pf sense Gonna add h e t p s colon slash slash There we go advanced Exceptors can continue And now we found my pf sense inside my network now the last thing i'm going to comment on is With zero tier. This is not a noise free Clean way to get into a network now whether or not it gets noticed on a network is a different topic But zero tier one is persistent. We'll figure out ways to get on the network But this is the host host 192 168 1.24 And these are all the connections it has and more specifically and port 9993 That is the initial zero tier connections that it did and these are all the zero tier ip addresses It connects to and talks to to make those connections. So First they're all udp and unless there's specific outbound udp filtering, which is usually not on networks Except for extremely locked down ones and even then It has some other ways that it may try to get around these But for the most part udp escapes pretty much unnoticed on most networks And if you block it you may have problems, but they're For the most part, it's not a noise free is what I really want to bring up So if this goes on a network, if you think you're being anonymous by being on there, well granted, they will know that you're Probably if someone reverses this it takes the time to look at these ip addresses. They may correlate that this is on zero tier So as I said, please make sure you have permission to be on the network And it's not like the cleanest noise free way to get back But it generally works I've had this work on a wide variety of networks with a wide variety of firewalls without any issues at all And I have no ports open on my firewall for this This is all what they refer to as udp hole punching where it just goes out finds those zero-tier servers And then my computer here my laptop went out and found those same zero-tier servers and brokered the connection between there So like I said, I'll leave a link to my zero-tier video where I dive in depth in the network engineering of what makes that work But it's a great tool great product and it makes doing this type of accountants work Just so much easier because like I said, it generally just works all the time out of the box You don't have to go fiddle with anything You just plug the Raspberry Pi in and have a great day or even mail it to someone Provided obviously they know she should be plugging it in mail it to them Have them plug it in because you want to do reconstance on a network But you don't have to have a ton of pre-existing knowledge of their network And especially if you're sending this to a remote client who's well They hired you to be their network engineer because that's not their task This makes it easier for them to plug in now. They don't have to tell you a lot of stuff They just know that hey, I got a switch here and I know I get internet when I plug it in That's all they you know get me internet and this will get online within a few minutes of being plugged in So once again, thanks for watching. I have more in-depth discussion questions comments concerns Outward to the forums is the best place to interact with me and discuss that I'll also leave links to some of the commands I use and of course a list of all the other videos Will be in there as well so you can pivot through You know learning each one of these different things I talked about in more depth. Thanks And thank you for making it to the end of the video If you like this video, please give it a thumbs up If you'd like to see more content from the channel, hit the subscribe button and hit the bell icon If you like YouTube to notify you when new videos come out If you'd like to hire us head over to laurancesystems.com fill out our contact page And let us know what we can help you with and what projects you'd like us to work together on If you want to carry on the discussion head over to forums.laurancesystems.com Where we can carry on the discussion about this video other videos or other tech topics in general Even suggestions for new videos. They're accepted right there on our forums, which are free Also, if you like to help the channel in other ways head over to our affiliate page We have a lot of great tech offers for you. And once again, thanks for watching and see you next time