fbpx

Configuring Kali Linux in the AWS Cloud with Public IP?

Problem carrying your Kali Linux with you? Or are you struggling hard to get the public IP associated with Kali Linux? Both and many of the problems can be solved by hosting the Kali Linux in the Amazon AWS (EC2) Cloud.

This video tutorial discusses the steps:

  • Configure the Amazon AWS account
  • Configure the Kali Linux instance in the AWS
  • Access the cloud based OS via SSH (using PuTTy in Windows and SSH in your Linux)
  • Install GNOME desktop environment on Kali Linux using the terminal
  • Setup the SSH tunneling (use TightVNC to access the GUI of the cloud based OS)

Follow me on Twitter & Facebook.

PuTTy Windows:          [email protected] 

For Linux users:

chmod 400 key_pairs.pem

ls -lah | grep key_pairs

ssh -i key_pairs.pem [email protected]

Local Linux machine:

sudo apt-get update

sudo apt-get install xfce4 xfce4-goodies tightvncserver

Install the GUI in the Kali Linux:

apt-get install gnome-core kali-defaults kali-root-login desktop-base

tightvncserver –geometry 1024×768

Local Kali Machine:

ssh -L 5901:localhost:5901 -N -f [email protected] -i key_pairs.pem

netstat -anop | grep 590

Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...