fbpx

Configuring Kali Linux in the AWS Cloud with Public IP?

Problem carrying your Kali Linux with you? Or are you struggling hard to get the public IP associated with Kali Linux? Both and many of the problems can be solved by hosting the Kali Linux in the Amazon AWS (EC2) Cloud.

This video tutorial discusses the steps:

  • Configure the Amazon AWS account
  • Configure the Kali Linux instance in the AWS
  • Access the cloud based OS via SSH (using PuTTy in Windows and SSH in your Linux)
  • Install GNOME desktop environment on Kali Linux using the terminal
  • Setup the SSH tunneling (use TightVNC to access the GUI of the cloud based OS)

Follow me on Twitter & Facebook.

PuTTy Windows:          [email protected] 

For Linux users:

chmod 400 key_pairs.pem

ls -lah | grep key_pairs

ssh -i key_pairs.pem [email protected]

Local Linux machine:

sudo apt-get update

sudo apt-get install xfce4 xfce4-goodies tightvncserver

Install the GUI in the Kali Linux:

apt-get install gnome-core kali-defaults kali-root-login desktop-base

tightvncserver –geometry 1024×768

Local Kali Machine:

ssh -L 5901:localhost:5901 -N -f [email protected] -i key_pairs.pem

netstat -anop | grep 590

Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

Top Tips To Avoid Getting Scammed In Sports Wagering Sites

If you’re a sports fan, you’ve probably wanted to dabble into the world of sports wagering. Who wouldn’t? Just the idea of being able...

5 Security Apps to Protect your Phone from Hackers

Our phones are much more than just communication devices these days. They save all of our personal, financial, and private information. Losing access to...

Ways to Improve Internet Speed

A slow-speed internet that makes you wait for ages before you can finally access a webpage is surely quite a pain! It tests your...

How to Reduce Risk with Runtime Application Self Protection

Instead of waning, cyber attacks continue to rise as the years pass. Several reasons contribute to this phenomenon, despite developing and deploying more robust...