Hosting Kali in the Cloud – Catch those Reverse Shells where they matter!


if you want to host Kali in the Cloud I can recommend the host Vultr!

You can prepay your account with PayPal and Bitcoin and fire up a Kali VM in 30 Minutes by “wgetting” the Kali minimal Iso to the hoster and booting via KVM and performing the Kali Installation Routine.

The prices are roughly half of comparable AWS Instances!

So just try it out, setting up a Kali VM and playing around a bit did cost me roughly 19 USD Cents…

You also can see you Account Balance and detailed per Server monthly fees in the Webinterface! If the VM is powered down it does not cost you anything.

Disclaimer: The link above and below are including a referral to my account!
If you like Vultr and stumbled onto it via my blog please use this link to sign up!

Feel free to post any comments or questions below!
I will be happy to reply quickly!

Best regards

About SebastianB

read it in my blog
This entry was posted in pentesting and tagged , , , , , , , . Bookmark the permalink.

11 Responses to Hosting Kali in the Cloud – Catch those Reverse Shells where they matter!

  1. M2wa2 says:

    Reblogged this on M2wa2..

  2. Anonymous says:

    Hi, do you have a link the the minimal via wget ?

  3. Flux says:

    This gives me an idea. My beast of windows pc just failed due to the motherboard. My mac is just not powerful enough (there’s also the issue of space) to run a Kali VM. Is it possible to set up an effective Kali platform for pentesting on a server that I can ssh into and use it like I would if I had a VM on my PC or dualbooted?

    • SebastianB says:

      There are always ways to do almost anything ;)

      So there is no problem hosting a Kali in the cloud and ssh’ing into it is obviosly also not a problem.

      If you need a desktop, you could use vnc or xforwards (many guides out there on the interwebz!).

      So the last and imho. most interesting part would be networking:

      Stuff on the internet you can “research” just fine.

      To “audit” a local network you would need to either:

      1. VPN in (if you get a public IP or Port Forward and Firewall rules you could set up openVPN. Easy at home and 100% doable but not realistic for companies and customers).

      Routing could be done via IP Pool (requires routes in the local network) and/or NATing Kali behin the VPN GW internal IP (no reverse shells/connections possible, at least locally via LAN)

      2. Selectively forward Porta via SSH so that you connect from within the LAN to your Kali on the Web and forward the local Ports in the SSH tunnel that you want to “test”

      Look into SSH remote portforward for this.

      Probably there are other scenarios where this works, however its never as flexible and easy as a local VM, imho…

      All of the above definetly works , so if you want to try it and struggle with the network part feel free to join IRC.

  4. Val erian says:

    I’m getting an error about the inability to load kernel modules. tried the mini iso for amd64 and i386

  5. techman says:

    provide a latest and update links and gives the platform for testing is very useful and easy to use.

  6. RootCommand says:

    Here’s how you can install a headless Kali Linux if you do not want the bloat caused by the desktop environment:


  7. Rienz says:

    Hi, do they allow penetration testing even from from their services? i

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.