@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
Finally someone explained SSH key exchange practically. Thank you for your effort.
Now I clearly understand what's going behind ssh. Thank you for making such awesome video!!!
You explained that process perfectly! Thank you, so much! Excellent video!
This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!
Well explained. Looking for this from a long time. Thanks a lot...!!!
Appreciate the Wireshark inspection too!
Awesome! Wonderfully explained with packet capture.
Great Explanation ! Congratulations !
Excellent explanation 👏👏 i have been looking for this detailed explanation!
Full love and appreciation for this great effort
such a transparent crystal clear concept explanation... Thank you
This video is perfect at 1.5 speed. Great work!
Very well explained. Thank you!
Good explanation... Now I understood this topic clearly pls continue to upload more videos
This is only video on CZcams that explains SSH protocol internal working in detail.
Wonderfull explaination, thanks buddy!
How did you do that?
You are awesome, you definitely nailed it
Thank you soooooooooo much for that illustration
Very nicely done!!
Fantastic!
This is the best video🎉
Clear explaination !! Thanku
The best explanation
great vide, thanks!
THANK YOU!
thank you!
This is excellent! Thank you!
Thank you for explaining the key exchange. I was tired of videos just saying "package is encrypted and then decrypted", I mean, of coursee but how?
@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
Correct, routers are the devices that allow communication between different networks/subnets.
how do they end up with the same secret key if the private keys were never shared?
does that mean ssh is also prone to MITM if there is no involvement of certificate authority?
I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
Anyone has been able to figure this out? I really dont get how MITM attack should not work if every key is sent over cleartext
can you send me the slide show?
I think the speaker is Iranian I can tell from his accent I am Persian too