Technical requirements
Before we start, we must have the following ready:
- The Microsoft Azure account we used in Chapter 5, Setting Up Isolated Penetration Testing Lab Environments on Azure
- The Microsoft Remote Desktop application installed on your local machine
- The golden image of the Kali Linux VM instance created in the Leveraging Terraform to automatically set up the attacker VM instance section of Chapter 5, Setting Up Isolated Penetration Testing Lab Environments on Azure
- Any text editor (such as Notepad++, Visual Studio Code, or Sublime Text) where we can temporarily store specific values (for example, your local machine’s IP address) that will be used in the hands-on solutions in this chapter
You may proceed with the next steps once these requirements are ready.
Important note
Make sure that you have worked on the hands-on solutions of Chapter 5 before proceeding. This chapter assumes that we have already created the golden VM image of...