This chapter walked you through how to set up an EC2 instance and configure all the nitty-gritty of setting up an EC2 instance, such as creating a new VPC, configuring a new subnet within a VPC, and adding additional storage. This chapter explained the different types of storage that are available for use with EC2 instances, such as EBS and Instance Store. Furthermore, we got to know the types of storage volumes and what they are suited for. Subsequently, we learned how to configure firewall rules using the security group of an EC2 instance. This brings us to the end of this chapter.
In the next chapter, we will learn how to perform real-life penetration testing of an AWS environment running multiple EC2 instances. Furthermore, we will learn how to perform automated exploits using Metasploit and perform a lateral movement in a network using host pivoting.
...