How SSH Works

Sdílet
Vložit
  • čas přidán 6. 04. 2022
  • In this video I explain how SSH works.
    Subscribe to my Odysee channel
    odysee.com/@AlphaNerd:8
    ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
    Monero
    45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
    Bitcoin
    3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
    Ethereum
    0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
    Litecoin
    MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
    Dash
    Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz
    Zcash
    t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr
    Chainlink
    0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14
    Bitcoin Cash
    qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp
    Etherum Classic
    0xeA641e59913960f578ad39A6B4d02051A5556BfC
    USD Coin
    0x0B045f743A693b225630862a3464B52fefE79FdB
    Subscribe to my CZcams channel goo.gl/9U10Wz
    and be sure to click that notification bell so you know when new videos are released.
  • Věda a technologie

Komentáře • 409

  • @brianobey4368
    @brianobey4368 Před 2 lety +1504

    Ya can't just go around tell the normies about elite hacker tools like ssh. This is gonna get you another strike. Don't you know the first rule about ssh is shh.

    • @KatzRool
      @KatzRool Před 2 lety +85

      legendary commentary

    • @davidkeys4284
      @davidkeys4284 Před 2 lety +6

      It's a scp

    • @Linuslkm
      @Linuslkm Před 2 lety +89

      Elite hacker tool wtf, i like this comment because it sits on the line of it being either 8 layers of irony or being made by a 6yo thanks for this masterpiece lmao

    • @devilfrog4209
      @devilfrog4209 Před rokem +4

      "Elite hacker tool" boy what

    • @amunkus2773
      @amunkus2773 Před rokem +55

      @@devilfrog4209
      The joke 💨💨💨
      🤓

  • @Toyking10
    @Toyking10 Před 2 lety +1214

    I didn’t know how SSH works. Now I do. Thanks Mr Outlaw.

    • @AshleyRiot
      @AshleyRiot Před 2 lety +24

      I didn’t even know it existed. Thank you Mr. Outlaw.

    • @Contractor48
      @Contractor48 Před 2 lety +39

      Yes, now for the other mystery in the life..does anyone know what a woman is?

    • @itsdokko2990
      @itsdokko2990 Před 2 lety +8

      @@Contractor48 they're a myth

    • @AshleyRiot
      @AshleyRiot Před 2 lety +30

      @@Contractor48 is that some sort of forbidden torrent technique?

    • @Contractor48
      @Contractor48 Před 2 lety +20

      @@AshleyRiot I don’t know, I am not a biologist.

  • @crekkk
    @crekkk Před 2 lety +556

    It would be great if you could do more of these informative style videos. I suppose the majority of your viewers are probably technically proficient so perhaps it wouldn't be worth it but I think you have an excellent way of explaining a topic without being condescending. It's nice to watch someone explain something without stopping for every tiny detail, but covering the concept in a way that people can understand and develop as a platform for their learning. Either way, great video Outlaw.

    • @TirisT1000
      @TirisT1000 Před 2 lety +26

      I agree! His style of presentation is informative and enjoyable. Perhaps a second channel would be good?
      I'm still new to computer science topics and am trying to get out of the 'I don't know what I don't know' phase by absorbing as much as I can, so this video was great.

    • @spaghettilastname3095
      @spaghettilastname3095 Před 2 lety +1

      I also like this

    • @LungCancer420
      @LungCancer420 Před 2 lety +4

      I started watching this channel because of the technically informative videos. Now I watch this channel for multiple kinds of informative videos. I just hope Mr. Outlaw keeps churning out videos for us to learn stuff

    • @tjdjultima
      @tjdjultima Před 2 lety +2

      I work in the industry and don’t know a lot of this as it’s not immediately related to my role, so, totally agree!

  • @AgentFortySeven47
    @AgentFortySeven47 Před 2 lety +359

    SSH is one of those concepts I've struggled with a bit in my IT studies. This video explained it perfectly for me. Thanks Mental Outlaw.

  • @atpray
    @atpray Před 2 lety +210

    ssh is a life safer. My use cases
    - Managing my servers.
    - ssh config file is super helpful. Instead of remembering multiple ip's and ports, I can assign it a simple name.
    - Public-private key authentication is super easy. More secure and much convenient, instead of typing password each time you ssh.
    - Port forwarding with ssh to use a vnc viewer on my local desktop. Even tho servers are not meant to have a desktop environment, sometimes it is required (I use them with docker or lxd containers)
    - Port forwarding with ssh to test/configure the website before making it public.
    - Using sshfs, to mount a server directory on local machine. Kinda works like network storage.

    • @TurkeyOW
      @TurkeyOW Před 2 lety +5

      I already knew a bit abt ssh so this video was more of a fun time killer. Super cool to hear examples of its versatility because when learning new topics I have a hard time grasping just how many places you can apply them.

    • @ziemniok111
      @ziemniok111 Před 2 lety +5

      ssh tunneling is fucking brilliant

    • @toasty_dreamss2076
      @toasty_dreamss2076 Před 2 lety +1

      @@TurkeyOW same. Learning the application of a topic is a bit tough when you're starting out. It's the fun-est bit tho... applicability is key 🔑👌

    • @srpenguinbr
      @srpenguinbr Před 2 lety +5

      Another use: logging into a local vm in your regular terminal

    • @-morrow
      @-morrow Před 5 měsíci

      another fun thing: proxy jump through a bastion host

  • @bahathir_
    @bahathir_ Před 2 lety +48

    In late 1990's, network was simple. PC's were connected to 'HUB', and it was very easy to 'sniff' connections. With Slackware Linux, I used program called 'sniffit' and I able to 'see' every connections in the network. IRC was very popular, and I able to 'see' all the chats and sometime I pranked them. :)
    SSH not just replaced the rsh or rlogin, but also ftp and rcp too.
    Thank you.

  • @SacreligousTurkey
    @SacreligousTurkey Před 2 lety +86

    Aside from the bloat free, direct, and well articulated information you present every time... That creepy Joe meme at 2:38 is why you’re my favorite person on CZcams

    • @raynerhandrian1486
      @raynerhandrian1486 Před 2 lety +2

      And it's a lot more cursed if you know the character in that meme

    • @mrkiky
      @mrkiky Před rokem +7

      Creepy Joe sniffing that poor unencrypted packet 😥

    • @josesantana3825
      @josesantana3825 Před 6 dny

      😅

  • @RetroDev256
    @RetroDev256 Před 2 lety +95

    Maybe a better idea of what padding would represent in your analogy would not to mix in decoy packages, but to use the same package size for each item you receive, so you could not theoretically infer information about the object inside by its size

    • @fischmann1746
      @fischmann1746 Před rokem +1

      This.

    • @GhostkillerPlaysMC
      @GhostkillerPlaysMC Před 2 měsíci

      How does it do that? I was thinking it’d be more like putting rocks in the packages. But is this standard weight large enough so that no packet will need to be greater than it?

  • @Gbennett1425
    @Gbennett1425 Před 2 lety +30

    I am needing to use this with my Raspberry pi for a class project, having one of my favorite youtubers in this field explain how it works makes it even better

    • @NostraDavid2
      @NostraDavid2 Před 2 lety +1

      You've probably used ssh-keygen to create a private and public key file, right? I also assume you need to input your password when you log into your pi?
      Use ssh-copy-id to copy your public key to the pi. You'll probably have to change your local config, but it's sooo nice not to type your password every time! :D

    • @Gbennett1425
      @Gbennett1425 Před 2 lety +1

      @@NostraDavid2 thanks for the tip, I’ll definitely be sure to try that

  • @sebastianarrieta9678
    @sebastianarrieta9678 Před 2 lety +27

    Thanks to SSH, SFTP exists. It's the same as FTP but through SSH. And it doesn't need the other server to run a FTP server!!!!

  • @YSANROCHEOfficialYoutube
    @YSANROCHEOfficialYoutube Před 2 lety +2

    You are doing great, I highly appreciate videos of content creators like you. Sending Praise and Love to you, keep going

  • @Kaz-qz2oq
    @Kaz-qz2oq Před 2 lety +7

    I learned about SSH by jailbreaking my Apple products years ago. Thanks for spreading the love

  • @ozzy2361
    @ozzy2361 Před 2 lety +4

    Not only did I really enjoy this, but I also learned a lot. Started from the creation of ssh to modern ssh, all while being super concise. Thanks a lot man!

  • @stefanklaus6441
    @stefanklaus6441 Před 2 lety

    I would really appreciate more videos like this
    A bit calmer and more focused than usual.

  • @cxob2134
    @cxob2134 Před 2 lety +7

    use it every day, still learned something, the sign of good content!

  • @alwayslaidback
    @alwayslaidback Před 2 lety +1

    Perfect video for me as an ongoing systems engineer. Thanks!

  • @sethbingo
    @sethbingo Před 2 lety +12

    Just wanted to drop by and say your videos helped me get SEC+ certified. Thanks 👍

  • @MeroFuruyaSankarea
    @MeroFuruyaSankarea Před 2 lety +14

    this is the content corporate youtube wants!

  • @midimusicforever
    @midimusicforever Před 2 lety +2

    Very important tool that one just uses without stopping to appreciate what a nice thing it is!

  • @mfThump
    @mfThump Před 2 lety +13

    watch out man youtube might decide that controlling another device from your computer is encouraging hacking.

  • @codinginflow
    @codinginflow Před rokem

    Wow, this was really well done. Concise and to the point.

  • @tedbear631
    @tedbear631 Před 2 lety +2

    Thanks as always for this. Love learning about this kind of thing even though I already know a lot about tech didn't know much about SSH except is was secure thanks!!!

  • @FirstnameLastname-xw5pb

    Ay G ion dub I didnt even know what u on till I saw this video thanks dawg u da real one G keep it up and stay up.

  • @CLOUD-dy9cr
    @CLOUD-dy9cr Před 2 lety +5

    Just learned about SSH but very informative of the in depths, thank you mental outlaw

  • @xn1kkix
    @xn1kkix Před 2 lety

    thank u, been dealing with some crazy stuff lately this helps

  • @CristianMorales1
    @CristianMorales1 Před 2 měsíci +1

    Pleasant narration. Keep up the good work. 👌🏻

  • @WORMSTweaker
    @WORMSTweaker Před 2 lety

    You made me discover the -X argument for SSH, thank you, this is amazing

  • @halcyonacoustic7366
    @halcyonacoustic7366 Před 2 lety

    I knew a few use cases for ssh but what it is is often glossed over. Thanks for the video!

  • @teacon7
    @teacon7 Před 2 lety

    This vid looks nice and inoffensive, sure, but also it's useful and informative in its own right. Thanks for making it.

  • @lex_darlog_fun
    @lex_darlog_fun Před 2 lety +1

    Thanks a lot, and the video has (almost) prefect timing personally for me.
    I was wondering about how secure the secure shell is, and you helped me get rid of most of my worries. 👍🏻
    Though, I'm still unsure if the initial credentials can be intercepted - if an attacker sniffs packets as I perform the very first thing: establishing connection (and, later, providing my credentials).

  • @AruaRamosMetellodeAssis
    @AruaRamosMetellodeAssis Před 2 lety +1

    a good topic to follow would be to teach what are ssh tunnels and how to use them.
    they are very useful for the management of local network resources and yet most linux users i talked so far never used them.

  • @kebman
    @kebman Před 2 lety +3

    There's a specific reason for why compression is added last due to how compression before encryption introduces some recognizable patterns, even though it might even be detrimental to the achievable level of compression. But safety first! :)

  • @AdrX003
    @AdrX003 Před 2 lety

    I usually read stuff about this but i might start checking out more videos like these, look very interesting, Thanks!

  • @KotleKettle
    @KotleKettle Před 2 lety

    And again, thank you for educating us, normies, my humble king. Love you 💕

  • @eideticex
    @eideticex Před 2 lety +8

    Another really nice use of SSH is debugging software, especially interop software where more than one programming language and runtime is used. Got a lot of mileage out of it for debugging some C# interop recently when the existing debuggers for that just weren't giving low enough level of information. Kept an SSH session open monitor the specific portions of the logs involved on another machine but could have just as well done it from the machine itself since SSH works the same locally as it does remotely.

    • @kreuner11
      @kreuner11 Před 2 lety +1

      Why do you need ssh for that?

    • @satibel
      @satibel Před 2 lety

      @@kreuner11 basically TeamViewer for command line
      Yeah there are other options but watch or inotify over ssh works very well for this use case (monitoring logs)

    • @kreuner11
      @kreuner11 Před 2 lety +3

      @@satibel I mean, for local logs you can use tail -f

  • @synchro505
    @synchro505 Před 2 lety

    An here I thought I knew a thing or two about SSH. Nope. Learned a ton from this video. Many thanks!

  • @barbobrien9318
    @barbobrien9318 Před 10 měsíci

    Well-presented and engaging.

  • @MC2738
    @MC2738 Před 2 lety +13

    I laughed so hard at 2:38.
    Well done, my friend, well done.

  • @danub3926
    @danub3926 Před 2 lety

    Very nice explanation. As a linux ssh newbie I found your explanation very informative. I followed ya on Odysee just in case the algorithym gets ya. . .

  • @kd7nyq
    @kd7nyq Před 2 lety

    Those photos and graphics sure take me back!

  • @purdysanchez
    @purdysanchez Před 2 měsíci

    This was a great video. You should do more of these. Maybe one about how asymmetric encryption is used to negotiate the connection and exchange the symmetric key?

  • @KangJangkrik
    @KangJangkrik Před 2 lety

    Finally, useful video! This is better than biased rant like what Kenny usually did, tbh

  • @shaunkerr8721
    @shaunkerr8721 Před 10 měsíci +2

    The TCP/UDP water analogy was hilarious.

  • @redringofdeathgamer
    @redringofdeathgamer Před 2 lety +3

    "Sniffing it.". Chef's kiss.😁

  • @jimjam742
    @jimjam742 Před 2 lety +3

    0:25 ah yes, SHH
    everybody's favorite remote shell protocol

  • @joeldoxtator9804
    @joeldoxtator9804 Před 2 lety

    SSH is my favorite function of linux. It's the best way to manage a server rack all the way down to the router.

  • @highmanwich5413
    @highmanwich5413 Před 2 lety

    Thanks for the video Mr. Outlaw! Have a good one 😃

  • @timothyt.82
    @timothyt.82 Před 2 lety

    It's great to have you back!

  • @vladislavkaras491
    @vladislavkaras491 Před 8 měsíci

    Thanks for the video!

  • @lucaramponi4022
    @lucaramponi4022 Před 2 lety +1

    Outstanding video, great work Mental sir

  • @lightmorrison5404
    @lightmorrison5404 Před 2 lety

    please do more of these style of this videos along with your normal stuff!!

  • @heller166
    @heller166 Před 2 lety +1

    the matrix background behind the packet breakdown had me rolling

  • @joiscode3832
    @joiscode3832 Před 2 lety

    Thx. Its go to understand how what your doing works

  • @johngold5214
    @johngold5214 Před 2 lety

    Fantastic video! It was easy to follow and didn't' bore me at any point.

  • @incelloner4465
    @incelloner4465 Před 2 lety

    lol love the memes, I'm subscribing

  • @apollomedia7210
    @apollomedia7210 Před 2 lety

    That TCP UDP picture was spot on. Funny lol

  • @No_one1776
    @No_one1776 Před 2 lety

    Nice job explaining this

  • @Thomas-41234
    @Thomas-41234 Před 2 lety +2

    In 1997 I had a direct ethernet connection from my apartment to the university network. I used some aplication (can't remember the name) to get the X from the university unix computers to my linux computer. It was all unsecure telnet connections. We had hundreds of students with their computers sharing pics, music and whatever in their unsecure FTP connections. Damn, those were crazy times, haha.

  • @dk0money
    @dk0money Před 2 lety

    Great explanation and illustration.

  • @tim000x3
    @tim000x3 Před 2 lety +6

    0:30 SHH graphic

  • @down4good
    @down4good Před 2 lety

    Damn how do you put out so many vids. My fave channel!

  • @wisteela
    @wisteela Před 3 měsíci

    Very informative

  • @LinuxUser123
    @LinuxUser123 Před 2 lety

    I recently just installed bitvise to host an ssh server for file sharing, works great, I recommend that if you Wana host ssh on windows

  • @connivingkhajiit
    @connivingkhajiit Před 2 lety +20

    Good evening, Mr. Outlaw. Any chance you could do a video about port forwarding? My suddenly stopped seeding and supposedly my port is not forwarded. I'm too smooth-brained about networking to figure it out properly.

    • @derram0k
      @derram0k Před 2 lety +6

      Port forwarding is done on your router and might be called something different depending on what router you have.
      There's a website that breaks it down pretty simply.

    • @whitewolf262
      @whitewolf262 Před 2 lety +7

      Also: on some ISP supplied routers, it's very difficult or even impossible to port forward. I ended up buying my own equipment because of it.

    • @sunglocto
      @sunglocto Před 2 lety +1

      @@whitewolf262 Yeah, on my sky router you need to pay for static ips and port fotwarding

    • @tworiversfolk923
      @tworiversfolk923 Před 2 lety

      @@sunglocto Thats insane you would need to pay for static IP's! Next thing to happen is force /30 instead of the standard /24 for the subnet.

    • @connivingkhajiit
      @connivingkhajiit Před rokem +1

      @@tworiversfolk923 in the last 10 months i took two networking classes at my university and now i know what that means!

  • @morsine
    @morsine Před 2 lety

    I've used Linux since more than 12 years ago, however I've never read how SSH works. Thank you for making this!

  • @es1090
    @es1090 Před 3 měsíci

    Nicely put, thanks.

  • @aslanbekx
    @aslanbekx Před 19 dny +1

    The first time I heard about ssh I remember saying: Surely I should abuse it

  • @friday6014
    @friday6014 Před 2 lety

    Do one on the Nym network. They use sphinx packets like the lightening network, reorder the packets, use decoy traffic and adjustable timing delay to defeat timing correlation

  • @Jazztache
    @Jazztache Před 2 lety +2

    Hey Mental Outlaw!
    What's your opinion on Godot? I'm jumping from Unity to Godot because it's free and open software and it runs better on Linux than Unity.
    Thanks!

  • @bigsyrup8567
    @bigsyrup8567 Před 2 lety +10

    I’m basically a boomer, with only enough computer smarts to be safe. I don’t normally really care about the minutiae of computers. So why do I really like your videos explaining it?

  • @elismith6048
    @elismith6048 Před 3 měsíci

    thank you for the video its really good could you make a video talking about ssh tunneling?

  • @encrypt3d587
    @encrypt3d587 Před 2 lety

    I was looking for a good explanation of the protocol yesterday, get out of my walls

  • @ram9881
    @ram9881 Před 2 lety

    This video is outstanding and packed with knowledge, but is no one going to talk about the Nagisa cameo? MentalOutlaw trutly is a man of culture.

  • @afallingtree9114
    @afallingtree9114 Před 2 lety +8

    this is the type of information that needs to be taught in school

    • @ghosthunter0950
      @ghosthunter0950 Před 2 lety

      Haha you wish. They aren't even teaching standard stuff that every single person will have to know. The school system is a failure in everything but the intention behind it.

    • @JValor
      @JValor Před 2 lety

      American schools don't want to mold utilitarians, they want lap dogs.

    • @afallingtree9114
      @afallingtree9114 Před 2 lety

      @@ghosthunter0950 absolutely, but there isn't a whole lot we can realistically do about it

    • @guzzergusher
      @guzzergusher Před měsícem

      It already is lol

  • @icemangrant6081
    @icemangrant6081 Před 2 lety

    Thanks bro🤝

  • @CesarSantoyo-il4ql
    @CesarSantoyo-il4ql Před měsícem

    Bro explained this better than all my instructors 💀

  • @murtadha96
    @murtadha96 Před 2 lety

    Great explanation! Thanks

  • @ducodarling
    @ducodarling Před 2 lety

    I never know if I should expect some useful tech info, or how to cook chicken...
    Happy either way. 🖥+🔑+🖥 = ⚖

  • @frostnetz
    @frostnetz Před 2 lety +3

    0:25 it says SHH on the graphic, instead of SSH ^^

  • @isbestlizard
    @isbestlizard Před 2 lety +2

    You could have mentioned scp which allows file copies between hosts via ssh, and is super useful for those times you want to move files but can't be arsed setting up nfs.

    • @isbestlizard
      @isbestlizard Před 2 lety +2

      Oooooh and authorized_keys versus password authentication, once you have a key you can zip between loads of hosts without ever having to type your password again :D

  • @Paul-oi2wz
    @Paul-oi2wz Před 2 lety

    What I hoped to learn (which I can't find anywhere) is how do both parties exchange keys without outsiders listening in which will allow to however listening in on the key exchanges to decrypt everything.

  • @Radi0he4d1
    @Radi0he4d1 Před 2 lety +3

    I know I can read how X11 works on Wikipedia, but having Mental Outlaw explain it would be way cooler

  • @itachi2011100
    @itachi2011100 Před 2 lety +1

    Could you possibly do a video on setting up X11 remote login? Akin to what we see in universities where you have a dumb graphical login page and it starts and connects to a session running on the server.

  • @marindedic441
    @marindedic441 Před 11 měsíci

    Great video. Just wanted to say that websockets also use TCP

  • @vikastiwari6780
    @vikastiwari6780 Před 5 měsíci

    In simple word.
    The main afocus on 2 keys..
    Public key send on remote machine then the key will match the the Linux remote connection established..
    This is simple way to understand....
    Suppose access denied then check on sshd configuration file..

  • @usemt9726
    @usemt9726 Před 2 lety

    Very good video man, thanks

  • @thenayancat8802
    @thenayancat8802 Před 4 měsíci

    Doesn't terminal multiplexing refer to having a single shell instance spawn a bunch of different shells? Example I'm used to is making a single SSH connection to a remote and then opening screen or tmux on the remote

  • @yunghart
    @yunghart Před 2 lety

    Do you have a video explaining what proxies do/are and the different types?

  • @caioleonardo7313
    @caioleonardo7313 Před 2 lety

    You can do X11 forwarding on windows if u download an X server for windows

  • @Silikone
    @Silikone Před 2 lety

    I'd love to know more about how terminals/shells work on Linux in general, remote and local.

  • @jonragnarsson
    @jonragnarsson Před 2 lety

    SSH is amazing, especially ssh tunneling. Saves so much headache.

  • @lanpartylandlord6123
    @lanpartylandlord6123 Před 2 lety

    great video. thank you

  • @theITGuy-no3nt
    @theITGuy-no3nt Před 2 lety

    Wow. This is the perfect SSH primer. -- a Grey Beard who would have picked you up on the tiniest mistake, but found none

  • @alexhiatt3374
    @alexhiatt3374 Před rokem

    very helpful, thanks :)

  • @youssefhassan3072
    @youssefhassan3072 Před 2 lety

    Nice video ! I still don't quite understand how the encryption key is shared between the sender and receiver.

  • @garygranato9164
    @garygranato9164 Před 2 lety

    please make a video on the vulnrabilities of the xwindow system

  • @MessingWithCode
    @MessingWithCode Před 3 měsíci

    Great Video

  • @FedericoTrentonGame
    @FedericoTrentonGame Před 2 lety

    I really like your videos

  • @jwr9888
    @jwr9888 Před rokem

    Hey did you create that table at 6:14 yourself? Or did you get it from somewhere

  • @Godmil
    @Godmil Před 2 měsíci +1

    How do the client and server know how to use the same encryption/decryption methods? Is that info sent, and what stops a man-in-the-middle getting that info then intercepting packets unencrypting them and then reencrypting them? 😕