Preparing the necessary components and prerequisites
In this section, we will set up the isolated network environment where the target resources will be launched. This will ensure that vulnerable and misconfigured resources and services can only be accessed by trusted machines – our local machine and the attacker’s machine:
Figure 8.1 — Preparing the prerequisites
We will also generate the SSH keys (the public key and the private key) for accessing the attacker VM instance later in this chapter. As shown in Figure 8.1, the private key will be stored inside your local machine while the public key will be stored inside the attacker VM instance. With this setup, the server (the attacker VM instance) can confirm the identity of the client (your local machine) using the private key. This will allow us to access the attacker VM instance via SSH and run commands remotely. In addition to this, we will make sure that the attacker VM instance...