9 - Cryptography Basics - SSH Protocol Explained

Sdílet
Vložit
  • čas přidán 18. 01. 2021
  • In this video you'll learn about the details of SSH protocol.

Komentáře • 37

  • @Andy-ee9ft
    @Andy-ee9ft Před 3 lety +21

    Finally someone explained SSH key exchange practically. Thank you for your effort.

  • @rahulanshan1371
    @rahulanshan1371 Před rokem +1

    Now I clearly understand what's going behind ssh. Thank you for making such awesome video!!!

  • @Hacker_Baby
    @Hacker_Baby Před 2 lety +3

    You explained that process perfectly! Thank you, so much! Excellent video!

  • @loping4
    @loping4 Před 6 měsíci

    This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!

  • @MAYANKSHARMA_NITK
    @MAYANKSHARMA_NITK Před 2 lety +2

    Well explained. Looking for this from a long time. Thanks a lot...!!!

  • @demetriows1207
    @demetriows1207 Před 2 lety +2

    Appreciate the Wireshark inspection too!

  • @ankit7319
    @ankit7319 Před 2 lety

    Awesome! Wonderfully explained with packet capture.

  • @brunomedeirosfraga
    @brunomedeirosfraga Před 2 lety

    Great Explanation ! Congratulations !

  • @sruhaana5096
    @sruhaana5096 Před 3 lety +2

    Excellent explanation 👏👏 i have been looking for this detailed explanation!

  • @ahmadnader8586
    @ahmadnader8586 Před rokem

    Full love and appreciation for this great effort

  • @saaransh01
    @saaransh01 Před 10 měsíci

    such a transparent crystal clear concept explanation... Thank you

  • @carlosabiamer
    @carlosabiamer Před rokem

    This video is perfect at 1.5 speed. Great work!

  • @V1kT0R04
    @V1kT0R04 Před rokem

    Very well explained. Thank you!

  • @saimrudula2140
    @saimrudula2140 Před 2 lety

    Good explanation... Now I understood this topic clearly pls continue to upload more videos

  • @hack0x90
    @hack0x90 Před rokem

    This is only video on CZcams that explains SSH protocol internal working in detail.

  • @ilgizsimashev2354
    @ilgizsimashev2354 Před 3 měsíci

    Wonderfull explaination, thanks buddy!

  • @mohammedkaram8606
    @mohammedkaram8606 Před rokem

    How did you do that?
    You are awesome, you definitely nailed it
    Thank you soooooooooo much for that illustration

  • @bsb770
    @bsb770 Před rokem

    Very nicely done!!

  • @annygrijalba6376
    @annygrijalba6376 Před 2 lety

    Fantastic!

  • @austinaaron7018
    @austinaaron7018 Před 7 měsíci

    This is the best video🎉

  • @aamirhamid4701
    @aamirhamid4701 Před 2 lety

    Clear explaination !! Thanku

  • @xaviercp2200
    @xaviercp2200 Před 2 lety

    The best explanation

  • @PouyaAtaei
    @PouyaAtaei Před rokem

    great vide, thanks!

  • @alexanderyelich817
    @alexanderyelich817 Před rokem

    THANK YOU!

  • @norsie45
    @norsie45 Před 2 lety

    thank you!

  • @ugaaga198
    @ugaaga198 Před rokem

    This is excellent! Thank you!

  • @icheckedavailability
    @icheckedavailability Před rokem

    Thank you for explaining the key exchange. I was tired of videos just saying "package is encrypted and then decrypted", I mean, of coursee but how?

  • @brod515
    @brod515 Před 2 lety

    @2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.

    • @joseocampo8815
      @joseocampo8815 Před 2 lety

      Correct, routers are the devices that allow communication between different networks/subnets.

  • @ovafett3100
    @ovafett3100 Před 11 měsíci +1

    how do they end up with the same secret key if the private keys were never shared?

  • @kaushikkumarbora
    @kaushikkumarbora Před 2 lety +1

    does that mean ssh is also prone to MITM if there is no involvement of certificate authority?

    • @AnonYmous-spyonmepls
      @AnonYmous-spyonmepls Před 2 lety +1

      I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.

    • @ThePhinista
      @ThePhinista Před 2 lety +1

      I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.

    • @Inyafacegerman
      @Inyafacegerman Před rokem

      Anyone has been able to figure this out? I really dont get how MITM attack should not work if every key is sent over cleartext

  • @mrabea8336
    @mrabea8336 Před rokem

    can you send me the slide show?

  • @KurlandHickory
    @KurlandHickory Před 2 lety

    I think the speaker is Iranian I can tell from his accent I am Persian too