This chapter aims to help penetration testers who don't have direct access to targets for penetration testing set up a vulnerable lab environment within AWS. This lab will allow testers to practice various exploitation techniques using Metasploit and rudimentary scanning and vulnerability assessment using multiple tools within Kali. This chapter focuses on setting up a vulnerable Linux VM and a generic Windows VM on AWS, putting them on the same network.
In this chapter, we will cover the following topics:
- Setting up a personal pentesting lab for hacking on the cloud
- Configuring and securing the virtual lab to prevent unintended access