Configuring Kali Linux in the AWS Cloud with Public IP?

Problem carrying your Kali Linux with you? Or are you struggling hard to get the public IP associated with Kali Linux? Both and many of the problems can be solved by hosting the Kali Linux in the Amazon AWS (EC2) Cloud.

This video tutorial discusses the steps:

  • Configure the Amazon AWS account
  • Configure the Kali Linux instance in the AWS
  • Access the cloud based OS via SSH (using PuTTy in Windows and SSH in your Linux)
  • Install GNOME desktop environment on Kali Linux using the terminal
  • Setup the SSH tunneling (use TightVNC to access the GUI of the cloud based OS)

Follow me on Twitter & Facebook.

PuTTy Windows:          [email protected] 

For Linux users:

chmod 400 key_pairs.pem

ls -lah | grep key_pairs

ssh -i key_pairs.pem [email protected]

Local Linux machine:

sudo apt-get update

sudo apt-get install xfce4 xfce4-goodies tightvncserver

Install the GUI in the Kali Linux:

apt-get install gnome-core kali-defaults kali-root-login desktop-base

tightvncserver –geometry 1024×768

Local Kali Machine:

ssh -L 5901:localhost:5901 -N -f [email protected] -i key_pairs.pem

netstat -anop | grep 590

Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...