I logged into the target machine and used the commands "sudo docker ps," "curl localhost:80" to make sure that the OWASP Juice Shop image was successfully running. The screenshot below is a snippet of the main.tf in the secure_network directory that shows the resource that is being used "google_compute_network," as well as the vpc's that were created, the cidr range, and the subnets for both vpcs''. Since The screen shot focused on the attacker machine is the output from the command terraform apply -auto-approve after downloading the Kali Linux generic cloud x64 image, reformatting it into a compatible .tar.gz file to store into a bucket that was created. After setting up Kali Linux through a web terminal and adding xfce, xrdp, and novnc to access a desktop version through the web a machine image was the created to add to the terraform code which would complete the build of the penetration testing lab.
Below are screenshots of a working Kali Linux Desktop that has access to OWASP Juice Shop. This image is ran through docker on an Ubuntu server. The other to screenshots shows NMAP being used to see which ports are open on the victim machine and one of the more simpler SQL injections being used to login as admin in the OWASP Juice Shop.