fbpx

Configuring Kali Linux in the AWS Cloud with Public IP?

Problem carrying your Kali Linux with you? Or are you struggling hard to get the public IP associated with Kali Linux? Both and many of the problems can be solved by hosting the Kali Linux in the Amazon AWS (EC2) Cloud.

This video tutorial discusses the steps:

  • Configure the Amazon AWS account
  • Configure the Kali Linux instance in the AWS
  • Access the cloud based OS via SSH (using PuTTy in Windows and SSH in your Linux)
  • Install GNOME desktop environment on Kali Linux using the terminal
  • Setup the SSH tunneling (use TightVNC to access the GUI of the cloud based OS)

Follow me on Twitter & Facebook.

PuTTy Windows:          [email protected] 

For Linux users:

chmod 400 key_pairs.pem

ls -lah | grep key_pairs

ssh -i key_pairs.pem [email protected]

Local Linux machine:

sudo apt-get update

sudo apt-get install xfce4 xfce4-goodies tightvncserver

Install the GUI in the Kali Linux:

apt-get install gnome-core kali-defaults kali-root-login desktop-base

tightvncserver –geometry 1024×768

Local Kali Machine:

ssh -L 5901:localhost:5901 -N -f [email protected] -i key_pairs.pem

netstat -anop | grep 590

Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

Android Tips and Tricks for Getting the Most from Your Phone

Gone are the days when phones were only used to make phone calls and send text messages; nowadays, smartphones are more akin to a...

What Proxies Are For

When you cannot access certain sites or hide your identity, you need a tool for that. For example, the USA proxies are in demand...

Mobile Device Safety: Keeping your phone safe from intrusion

You might have heard that the iPhone is almost completely impossible to hack or that Samsung devices have some of the best firewalls in...

How to Detect Phishing Mails and Websites

Not long ago, phishing websites and mails looked quite unprofessional, they were peppered with spelling mistakes and had a distrustful design. Nowadays the digital...