Creating and Connecting to Linux Instances on AWS

Hi Everyone!

This is my second Blog from AWS PEN-TESTING series of Blogs. In my upcoming Blog, I am going to write separate blog on “Setting Up Lab Environment for AWS PEN-TESTING” where we will create two instances of AWS i.e. Linux Instance and windows Instance and then we will establish connection between them by Hosting them into same Region and same Network. but prior to that it is mandatory to understand “Creating and Connecting Linux Instance on AWS”

Step 1: Login to your AWS Account and navigate to Instances tab to create new Linux instance.

Step 2: Choose below Linux AMI(Amazon Machine Image) from instances list which is free tier.

Step 3: Keep the setting default for now and click on Review and Launch.

Step 4: When you click on Launch finally it will ask you to create or use previous key pair to Launch the instance. If you don’t have previously generated key-pair then click on “Create a new key -pair”.

when you follow above steps give the meaningful name to .pem file and download it and instance will Launch successfully. you can notice status that instance is running.

All the rest of steps to connect with your newly created Linux instance are already given by amazon on below link when you Launch the instance so follow along and connect to your Linux instance.

Usernames can be,

Follow along and in the next blog I will explain “Creating and Connecting to Windows Machine on AWS" and after that We will do Lab setup and install some vulnerable services and Applications to perform Pen-testing.

Thanks Readers!

Please provide your valuable feedback and suggestions.

--

--

--

Works @t @pple. Ethical Hacker, Vulnerability Assessment and Penetration Tester, Bug Hunter, Security Researcher, Optimistic, Philanthropist.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Mobile Apps Development

How to Best Tackle Dubsado Setup

Render farms and other services: How it can help you with a deadline?

Flutter #YetAnotherChallenge; Scoped Model vs BloC Pattern vs States Rebuilder vs Eventbus

JAVA Classes and objects

Striver Sheet Day 08 — Greedy Algorithm

Lil Brain — Case Study

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Mohammad Mohsin

Mohammad Mohsin

Works @t @pple. Ethical Hacker, Vulnerability Assessment and Penetration Tester, Bug Hunter, Security Researcher, Optimistic, Philanthropist.

More from Medium

Account Takeover [Using Forgot Password Functionality]

HACKED NOKIA WITH REFLECTED CROSS-SITE SCRIPTING VULNERABILITY….

HOW RECON HELPED ME TO GET A STORED XSS!

Reconnaissance in bug bounty is very important!

Stored XSS to stealing Admin credentials to your domain