Finally someone explained SSH key exchange practically. Thank you for your effort.
@loping4 Жыл бұрын
This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!
@kevinkimotho45892 ай бұрын
Great explanation! I have taken hand written notes of this and took a photo, backed up to google drive as i think this is priceless!!
@rahulanshan13712 жыл бұрын
Now I clearly understand what's going behind ssh. Thank you for making such awesome video!!!
@mustafaabdelfattah24934 ай бұрын
Perfect explanation for all playlist Also using wireshark to view the protocol behavior is great really great
@Hacker_Baby2 жыл бұрын
You explained that process perfectly! Thank you, so much! Excellent video!
@MAYANKSHARMA_NITK3 жыл бұрын
Well explained. Looking for this from a long time. Thanks a lot...!!!
@demetriows12073 жыл бұрын
Appreciate the Wireshark inspection too!
@carlosabiamer2 жыл бұрын
This video is perfect at 1.5 speed. Great work!
@sensei0x012 жыл бұрын
Full love and appreciation for this great effort
@hack0x90 Жыл бұрын
This is only video on KZbin that explains SSH protocol internal working in detail.
@saaransh01 Жыл бұрын
such a transparent crystal clear concept explanation... Thank you
@sruhaana50963 жыл бұрын
Excellent explanation 👏👏 i have been looking for this detailed explanation!
@ankit73192 жыл бұрын
Awesome! Wonderfully explained with packet capture.
@saimrudula21402 жыл бұрын
Good explanation... Now I understood this topic clearly pls continue to upload more videos
@brod5153 жыл бұрын
@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
@joseocampo88153 жыл бұрын
Correct, routers are the devices that allow communication between different networks/subnets.
@ilgizsimashev235410 ай бұрын
Wonderfull explaination, thanks buddy!
@brunomedeirosfraga3 жыл бұрын
Great Explanation ! Congratulations !
@ovafett3100 Жыл бұрын
how do they end up with the same secret key if the private keys were never shared?
@mustafaabdelfattah24934 ай бұрын
Thank you so much for this playlist Wait more ....
@V1kT0R042 жыл бұрын
Very well explained. Thank you!
@kaushikkumarbora3 жыл бұрын
does that mean ssh is also prone to MITM if there is no involvement of certificate authority?
@AnonYmous-spyonmepls3 жыл бұрын
I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
@ThePhinista2 жыл бұрын
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
@Inyafacegerman2 жыл бұрын
Anyone has been able to figure this out? I really dont get how MITM attack should not work if every key is sent over cleartext
@ivanraineri68313 ай бұрын
Outstanding explanation
@austinaaron7018 Жыл бұрын
This is the best video🎉
@bsb770 Жыл бұрын
Very nicely done!!
@mohammedkaram86062 жыл бұрын
How did you do that? You are awesome, you definitely nailed it Thank you soooooooooo much for that illustration
@behrad7013 күн бұрын
fantastic
@aamirhamid47012 жыл бұрын
Clear explaination !! Thanku
@icheckedavailability2 жыл бұрын
Thank you for explaining the key exchange. I was tired of videos just saying "package is encrypted and then decrypted", I mean, of coursee but how?
@xaviercp22003 жыл бұрын
The best explanation
@PouyaAtaei2 жыл бұрын
great vide, thanks!
@alexanderyelich8172 жыл бұрын
THANK YOU!
@ugaaga1982 жыл бұрын
This is excellent! Thank you!
@annygrijalba63763 жыл бұрын
Fantastic!
@norsie452 жыл бұрын
thank you!
@mrabea83362 жыл бұрын
can you send me the slide show?
@KurlandHickory2 жыл бұрын
I think the speaker is Iranian I can tell from his accent I am Persian too
@SukuGeorge6 ай бұрын
Should scratch any other explanation on SSH from internet forever and keep this alone.