Cloud Ethical Hacking : Use Kali Linux on Amazon AWS

Cloud Ethical Hacking : Use Kali Linux on Amazon AWS
Cloud Ethical Hacking : Use Kali Linux on Amazon AWS
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 3.5 Hours | 700 MB

The only course you need to start running Kali Linux and ethical hacking tasks on Amazon cloud!

Hi, welcome to the “Cloud Ethical Hacking : Use Kali Linux on Amazon AWS” course. The only course that you need to start running Kali Linux and ethical hacking tasks on Amazon cloud!

There are a lot of options for ethical hacking & penetration testing training, but this course is designed in a way you can practice newest & best techniques on ethical hacking. Here is why:

  • Instead of using your own host device, you will learn how to boot & run Kali Linux entirely on the Cloud.
  • You can use any browser to access your Kali Linux.
  • You will have an ethical hacking lab entirely on the cloud. This includes a Windows victim machine as well. No more cpu & memory problems, no more virtual machines in your local device.
  • You won’t have to spend a dime up to 1 year as you will use Amazon AWS Free Tier account for the entire training, provided that you take good care of the running instances to stay under the free limits. I will show you how you can do that.
  • You can access any Linux or Windows machine, directly within your browser. You can continue working in any PC and don’t lose the sessions.
  • You can save the entire screen like a movie so that you can show it as a proof of actions. You can later watch these screencasts to improve your skills.
  • You will practice nmap, metasploit, included in the course! Even if you are a complete beginner in cyber security and ethical hacking, or you want to refresh your skills, you will enjoy the course.

Furthermore, you can apply the skills in many hosting providers or even your own server! Amazon AWS is not the only option here. This is because some of the skills in this course is beyond the topic of ethical hacking.

The practical skills you will learn after you complete the course:

  • Current limitations of an ethical hacking lab
  • Benefits of running your VMs in the cloud
  • How to create an Amazon Free Tier account
  • How to run Kali Linux as an Amazon EC2 instance
  • EC2 dashboard management
  • Alternative terminal operations: A handy chrome extension for SSH sessions
  • Installing xRDP to Kali Linux. This is also useful if you intend to use GUI with any Linux machine
  • LXDE and XFCE session types
  • Running a Windows Server as an EC2 instance, which you can use both as a victim or an attacker machine.
  • Install Guacamole tool to access & operate any server using your Browser
  • Nmap basics to which helps you to start scanning in no time.
  • Metasploit commands to send exploits to vulnerable machines.
  • Exploting a vulnerable application on Windows Server

In a nutshell, by the end of the course, you’ll be able to create your own Ethical Hacking Lab on Amazon AWS cloud from scratch, using the latest techniques which black hat hackers use to penetrate systems remotely. Better than that, it won’t even take an hour to start running your machines.

Table of Contents

Quick Wins
1 AWS Basics and Creating the Kali Instance
2 Install xRDP with Kali
3 Guacamole Screen Introduction
4 De Facto Exploitation Framework Metasploit

5 Lets Meet
6 Curriculum Details

Virtual Machines and Lab Environment
7 Why do we need a lab
8 Current Limitations
9 Benefits of the Cloud

Introduction to Amazon AWS
10 Amazon Account and Free Tier
11 AWS Basics and Creating the Kali Instance
12 EC2 Dashboard and Instances Screen
13 Alternatives to Terminal
14 Wrap-up

Remote Lab Access
15 xRDP vs VNC
16 Install xRDP on Kali
17 RDP Security Settings
18 Accessing Kali using xRDP
19 Connecting Kali from Windows
20 Server side settings and Session Types
21 Wrap Up

Setting Up Windows
22 Windows Instance on AWS
23 Preparing Windows for Exploitation

Setting up Lab Environment
24 Intro
25 Install Centos on AWS
26 Install Guacamole via Script
27 Guacamole Screen Introduction
28 Connect to Windows
29 Guacamole Features
30 Screen Recording
31 Wrap Up

Ethical Hacking on AWS
32 AWS Pentesting Process
33 AWS Pentesting Approval
34 Amazon AWS Best Practices on Security

Windows Hacking with Kali
35 Introduction
36 Kali at a Glance
37 Our Favourite Network Scanner Tool Nmap
38 Identifying the Vulnerable Service on Windows
39 De Facto Exploitation Framework Metasploit
40 Exploiting the Windows Server and Using Meterpreter

41 Wrapping Up