![]() So, Kali Linux is ready, and being hosted in the cloud with public IP won't cost you anything. Now we will be connecting the local host using the TightVNC viewer, but you can use the Ubuntu default viewer as well. ![]() f runs the SSH commands in the background Now set up the SSH tunnel this should be done on your host Linux as an alternative to Kali (cloud). Kali:1 shows that it is listening on port 5900+1 =5901 As you will be using the VNC for the first time, it will ask you to create a password. The existing newly installed Kali Linux is the command-based OS, but we can get the GUI-based OS by running the following command in the newly created Kali Linux machine:Īpt-get install gnome-core kali-defaults kali-root-login desktop-baseĪfter installation of the GUI, set up the VNC server by changing the resolution. Sudo apt-get install xfce4 xfce4-goodies tightvncserver ![]() Now, update the packages and install the TightVNC on your host Linux machine: Windows with PuTTy (just to access the local and hosted Linux machine) - Note, this is not necessary, you can do all the functions with your local Linux too.Kali Linux (configured in the AWS cloud).Ubuntu (Local Linux machine to access Kali).Let’s move on to the steps to get the GUI access of the recently installed and configured Kali Linux machine. VNC over SSH Tunneling to get the GUI Access of Kali Linux in AWS Cloud Ssh -i key_pairs.pem the sudo su command, to get the root access to your Kali machine. For that, set the permissions and connect the server using SSH, then hit the following: You can access the Kali AWS from your Linux machine also. Note, you should not go over the usage limit, or your card will be charged. However, you can get all the tools by running the following command:Īlternatively run “apt-get install kali-linux-top10″ to get the top 10 security tools. As this is the minimal installation, you might not be able to access all the tools. NOTE, in the session, use the username ( ec2-user) and the public DNS detail of the Kali Linux “ Open”, and you are ready. Open the PuTTY program to connect it with your Kali Linux and load the private key in the Auth tab under the SSH navigation: Save the private key and close the PuTTYgen program. The purpose is to convert it into the PuTTY supported format: You need the following tools:ĭownload and install the tools from the official website then open PuTTygen and load the previously downloaded private key file. The process of configuring the Kali Linux in the cloud is now completed let’s discuss the steps to access it from your Windows OS. You can also view the status of your machine from the Amazon AWS console. You can confirm the region from your AWS console account as shown in the figure below:Ĭlick on the “ Launch with 1-click” button to launch the recently configured instance. Now, from your Amazon AWS Marketplace, locate the Kali Linux instance.īefore proceeding with the instance, make sure that the suitable region is selected. The private key will be automatically downloaded to your device keep it secure because you will not be able to get it again if you don’t have it. So, to generate SSH key pairs, go to your Amazon AWS console, click on the key pairs (under the network & security navigation), select the Create Key Pair option and give your selected pair a name. In the next step, you’ll need SSH key pairs to access Kali Linux from your host computer. Once verified, select the basic plan and move on to the next step. After successful login, provide your payment details (note, you will not be billed until you exceed the free tier limitation).Īfter providing your payment details, let Amazon confirm your identity using the call verification process. So, create an Amazon AWS account, or if already have one, log in to your account. In the first step, you’ll require Amazon AWS account. In this article, we will talk about the steps to configure Kali Linux on Amazon AWS cloud for free. The best possible way to accomplish your objective is to host Kali Linux in the cloud, where the vendor manages the network and server, so you can focus on your pentesting. However, this is not suggested because it will attract unwanted traffic and intruders that might recruit your machine into a global network of botnets. We can resolve this problem by opening a Linux computer to the internet, which involves configuring the router and port forwarding as well. They also complain that they can only use it within their local network. Having said that, people constantly complain about not getting the public IP (WAN). There are number of tutorials for Kali Linux available on the Internet. Kali Linux is the most desired pentesting distribution.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |