Configuring Kali Linux in the AWS Cloud with Public IP?

Problem carrying your Kali Linux with you? Or are you struggling hard to get the public IP associated with Kali Linux? Both and many of the problems can be solved by hosting the Kali Linux in the Amazon AWS (EC2) Cloud.

This video tutorial discusses the steps:

  • Configure the Amazon AWS account
  • Configure the Kali Linux instance in the AWS
  • Access the cloud based OS via SSH (using PuTTy in Windows and SSH in your Linux)
  • Install GNOME desktop environment on Kali Linux using the terminal
  • Setup the SSH tunneling (use TightVNC to access the GUI of the cloud based OS)

Follow me on Twitter & Facebook.

PuTTy Windows:          [email protected] 

For Linux users:

chmod 400 key_pairs.pem

ls -lah | grep key_pairs

ssh -i key_pairs.pem [email protected]

Local Linux machine:

sudo apt-get update

sudo apt-get install xfce4 xfce4-goodies tightvncserver

Install the GUI in the Kali Linux:

apt-get install gnome-core kali-defaults kali-root-login desktop-base

tightvncserver –geometry 1024×768

Local Kali Machine:

ssh -L 5901:localhost:5901 -N -f [email protected] -i key_pairs.pem

netstat -anop | grep 590

Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

Understand Encryption, Hashing, Encoding, and Obfuscation

You are mistaken if you believe Encryption, Hashing, Encoding, and Obfuscation are similar terms! Despite their apparent similarity, they are all opposed. This article...

Hacking & Cracking Windows Password by Just a PDF File

Passwords are always our first and, in cases, sole line of protection from attackers. If an intruder does not possess direct accessibility to a...

Port Forwarding via Meterpreter for Attacking Metasploitable 3

In this tutorial, we will learn how to do port forwarding in order to execute commands remotely on a target machine. Port forwarding is useful...

Are The Latest Developments In Online Gaming Crippling The Bingo Industry?

Introduction Bingo’s rich and extensive history stretches across almost five hundred years in different forms. Over the past decades, more and more people have moved...