Тёмный

9 - Cryptography Basics - SSH Protocol Explained 

CBTVid
Подписаться 5 тыс.
Просмотров 37 тыс.
50% 1

In this video you'll learn about the details of SSH protocol.

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 41   
@Andy-ee9ft
@Andy-ee9ft 3 года назад
Finally someone explained SSH key exchange practically. Thank you for your effort.
@mustafaabdelfattah2493
@mustafaabdelfattah2493 2 месяца назад
Perfect explanation for all playlist Also using wireshark to view the protocol behavior is great really great
@loping4
@loping4 10 месяцев назад
This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!
@Hacker_Baby
@Hacker_Baby 2 года назад
You explained that process perfectly! Thank you, so much! Excellent video!
@rahulanshan1371
@rahulanshan1371 2 года назад
Now I clearly understand what's going behind ssh. Thank you for making such awesome video!!!
@demetriows1207
@demetriows1207 2 года назад
Appreciate the Wireshark inspection too!
@MAYANKSHARMA_NITK
@MAYANKSHARMA_NITK 3 года назад
Well explained. Looking for this from a long time. Thanks a lot...!!!
@carlosabiamer
@carlosabiamer 2 года назад
This video is perfect at 1.5 speed. Great work!
@mustafaabdelfattah2493
@mustafaabdelfattah2493 2 месяца назад
Thank you so much for this playlist Wait more ....
@ahmadnader8586
@ahmadnader8586 Год назад
Full love and appreciation for this great effort
@saaransh01
@saaransh01 Год назад
such a transparent crystal clear concept explanation... Thank you
@hack0x90
@hack0x90 Год назад
This is only video on RU-vid that explains SSH protocol internal working in detail.
@ilgizsimashev2354
@ilgizsimashev2354 8 месяцев назад
Wonderfull explaination, thanks buddy!
@sruhaana5096
@sruhaana5096 3 года назад
Excellent explanation 👏👏 i have been looking for this detailed explanation!
@ankit7319
@ankit7319 2 года назад
Awesome! Wonderfully explained with packet capture.
@ivanraineri6831
@ivanraineri6831 28 дней назад
Outstanding explanation
@saimrudula2140
@saimrudula2140 2 года назад
Good explanation... Now I understood this topic clearly pls continue to upload more videos
@V1kT0R04
@V1kT0R04 2 года назад
Very well explained. Thank you!
@austinaaron7018
@austinaaron7018 Год назад
This is the best video🎉
@brunomedeirosfraga
@brunomedeirosfraga 3 года назад
Great Explanation ! Congratulations !
@bsb770
@bsb770 Год назад
Very nicely done!!
@mohammedkaram8606
@mohammedkaram8606 2 года назад
How did you do that? You are awesome, you definitely nailed it Thank you soooooooooo much for that illustration
@PouyaAtaei
@PouyaAtaei Год назад
great vide, thanks!
@ovafett3100
@ovafett3100 Год назад
how do they end up with the same secret key if the private keys were never shared?
@aamirhamid4701
@aamirhamid4701 2 года назад
Clear explaination !! Thanku
@icheckedavailability
@icheckedavailability 2 года назад
Thank you for explaining the key exchange. I was tired of videos just saying "package is encrypted and then decrypted", I mean, of coursee but how?
@ugaaga198
@ugaaga198 2 года назад
This is excellent! Thank you!
@xaviercp2200
@xaviercp2200 3 года назад
The best explanation
@kaushikkumarbora
@kaushikkumarbora 3 года назад
does that mean ssh is also prone to MITM if there is no involvement of certificate authority?
@AnonYmous-spyonmepls
@AnonYmous-spyonmepls 3 года назад
I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
@ThePhinista
@ThePhinista 2 года назад
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
@Inyafacegerman
@Inyafacegerman 2 года назад
Anyone has been able to figure this out? I really dont get how MITM attack should not work if every key is sent over cleartext
@alexanderyelich817
@alexanderyelich817 2 года назад
THANK YOU!
@annygrijalba6376
@annygrijalba6376 3 года назад
Fantastic!
@norsie45
@norsie45 2 года назад
thank you!
@brod515
@brod515 3 года назад
@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
@joseocampo8815
@joseocampo8815 3 года назад
Correct, routers are the devices that allow communication between different networks/subnets.
@mrabea8336
@mrabea8336 Год назад
can you send me the slide show?
@KurlandHickory
@KurlandHickory 2 года назад
I think the speaker is Iranian I can tell from his accent I am Persian too
@SukuGeorge
@SukuGeorge 4 месяца назад
Should scratch any other explanation on SSH from internet forever and keep this alone.