The linux based machines in the cloud runs an SSH daemon. After allowing port 22 incoming trough the security group in the virtual machine it is possible to log in trough ssh using the private part of the keypair used when creating the machine:
loginansatt01:~$ ssh debian@10.212.137.12 -i .ssh/id_rsa The authenticity of host '10.212.137.12 (10.212.137.12)' can't be established. ECDSA key fingerprint is SHA256:PIR85mFU0TiOZ0mXHz1ExMvds1D1YO1eF+/TTniAYfo. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '10.212.137.12' (ECDSA) to the list of known hosts. The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. debian@mysecondserver:~$
Usernames:
The various images uses different user-names. After login all images has sudo which allows the default user to become root. Reffer to this list to see which username the default user uses:
- CentOS 7 and 8 images: centos
- CentOS 9 images: cloud-user
- Debian based images: debian
- CirrOS (used for testing) has the username "cirros" and password "
cubswin:)
" - Fedora based images: fedora
- Feodre CoreOS based images (the ones used for the Kubernetes-clusters): core
- Ubuntu based images: ubuntu
- RedHat based images: cloud-user
- Kali Linux: kali
- Rocky Linux: rocky
- AlmaLinux: almalinux
Accessing the GUI of the Kali Linux image
The Kali Linux image provided in SkyHiGh comes vith VNC-server enabled for root by default. It listens on TCP 5901. To access it just point the VNC client of your choice to <kali-floating-ip>:5901
, and you should be good to go.
Remember to allow incoming traffic on TCP 5901 in a security group attached to your Kali machine.
The password is "kaliVNC" (feel free to change it to your own liking. In fact, you should really do that.)