In this section, we will go through the very first steps of setting up a virtual penetration testing machine on the cloud, as well as setting up remote access to it to perform penetration testing on the go. The penetration testing machine will go hand-in-hand with the penetration testing lab that was set up in the Chapter 1, Setting Up a Pentesting Lab on AWS, that allows you to perform penetration testing and exploitation on those hosts.
Setting up Kali Linux on AWS EC2
The Kali Linux AMI
AWS provides a fascinating feature that allows for the rapid deployment of Virtual Machines (VMs) on the Amazon Cloud—Amazon Machine Images (AMIs). These act as templates and allow one to quickly set up a new VM on AWS without going...