Kookarai in the Cloud
Introduction
For solving many Cyber Security Challenges, the student must have access to a Penetration Testing Workstation (Kali Linux, HL Kookarai Pentesting Linux). Most Hacking-Lab users download a virtual machine from https://livecd.hacking-lab.com/, which they use as a client for the tasks in Hacking-Lab.
But some customers prefer to deploy this workstation in the cloud and access it through the browser.
Although this cloud hacking workstation is slower to use, it has the advantage that you can run the tasks on the user's device.
Pre-Requirement
If the cloud hacking workstation is used by users of a larger company, it is possible that access through the company's security proxy infrastructure will be prevented.
The following technical measures are necessary for the Cloud Hacking Workstation to work through a corporate proxy.
Proxy Exceptions
Proxy Exception for
*.vuln.land
(Deployment Manager)WebSocket Execption for
*.vuln.land
(Deployment Manager)Proxy Exception for
switzerlandnorth.cloudapp.azure.com
(Kookarai Pentesting Linux in the Cloud)
Browser Support
The Cloud Hacking Workstation Azure has successfully used and tested with the following browsers
Google Chrome
Microsoft Edge
Firefox
YouTube