Setting up the target VM instance
With our isolated network environment ready, we can now proceed with setting up the target VM instance. In this section, we will set up the target VM instance in the subnet of VPC 01, similar to what we have in Figure 4.19:
Figure 4.19 – Setting up the target VM instance in the subnet of VPC 01
Inside the target VM instance, we will be running an intentionally vulnerable application called OWASP Juice Shop. OWASP Juice Shop was designed, developed, and prepared by the Open Web Application Security Project (OWASP) to help developers, security engineers, and penetration testers enhance their understanding of secure coding practices and vulnerability identification, along with various mitigation strategies. To simplify the setup and installation of the OWASP Juice Shop application in our VM instance, we will utilize the bkimminich/juice-shop
container image. This container image will allow us to run the vulnerable...