This chapter walked through the process of setting up Nessus on the Kali PentestBox on EC2. Following this, SSH tunneling was explained, within the context of accessing the Nessus service securely without exposing it to the internet. Once the Nessus instance was accessible, we were able to activate it and perform automated scans on the two hosts that were set up in the pentest lab. These automated scans came up with a number of results, which further helps us exploit both of them. Finally, the chapter covered exploiting and taking over the Linux box by exploiting a vulnerable network service, and the Windows box by exploiting a web application vulnerability.
This brings an end to this chapter, which is focused toward first-time pentesters who are looking to get into AWS pentesting but do not have a lab environment at hand. In the next chapter, we will take a deeper dive...