AccessData DNA & Amazon EC2 – Part Three

We continue our tutorial series on AccessData’s Distributed Network Attack (DNA) password recovery software with Amazon EC2 worker agents.

We cover finding, accessing and modifying an existing Ubuntu 10.10 AMI.  If you need to watch a video just on the process of starting with an existing Community AMI to access and modify it then you should watch this part.  In the next part four we will show how to take our modified AMI and save it to our Amazon S3 as a new template AMI.

The tools mentioned are:

Keep in mind as we are moving into Amazon Web Services, even if you use the free tier account our tutorial touches on instances and data transfers that might incur costs.  Hopefully they are small per Amazon’s wonderful pricing. BUT  *I* am not legally nor financially responsible for your use or how you use these tutorials. Please only do things you are legally and financially authorized for.  It is on you.

I have not ironed out the HTML5 player fall back to flash issue yet.  So if you cannot play the video in this post you can download it HERE or watch it over in my YouTube Channel.

Read More to get the list of commands used in this video.

>>ssh in (as user ubuntu)
sudo apt-get update
sudo apt-get dist-upgrade
sudo apt-get install x-window-system-core
sudo apt-get install ubuntu-desktop
sudo apt-get install wine
sudo dpkg -i nxclient_3.4.0-7_i386.deb
sudo dpkg -i nxnode_3.4.0-14_i386.deb
sudo dpkg -i nxserver_3.4.0-14_i386.deb
sudo passwd ubuntu
sudo vi /etc/ssh/sshd_config
>>turn on password auth by changing no to yes for the value “PasswordAuthentication”
sudo /etc/init.d/ssh restart