In this video you'll learn about the details of SSH protocol.
Пікірлер: 37
@Andy-ee9ft3 жыл бұрын
Finally someone explained SSH key exchange practically. Thank you for your effort.
@Hacker_Baby2 жыл бұрын
You explained that process perfectly! Thank you, so much! Excellent video!
@rahulanshan1371 Жыл бұрын
Now I clearly understand what's going behind ssh. Thank you for making such awesome video!!!
@MAYANKSHARMA_NITK2 жыл бұрын
Well explained. Looking for this from a long time. Thanks a lot...!!!
@loping45 ай бұрын
This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!
@demetriows12072 жыл бұрын
Appreciate the Wireshark inspection too!
@ankit7319 Жыл бұрын
Awesome! Wonderfully explained with packet capture.
@brunomedeirosfraga2 жыл бұрын
Great Explanation ! Congratulations !
@sruhaana50963 жыл бұрын
Excellent explanation 👏👏 i have been looking for this detailed explanation!
@ahmadnader8586 Жыл бұрын
Full love and appreciation for this great effort
@saaransh019 ай бұрын
such a transparent crystal clear concept explanation... Thank you
@V1kT0R04 Жыл бұрын
Very well explained. Thank you!
@carlosabiamer Жыл бұрын
This video is perfect at 1.5 speed. Great work!
@ilgizsimashev23542 ай бұрын
Wonderfull explaination, thanks buddy!
@hack0x90 Жыл бұрын
This is only video on KZbin that explains SSH protocol internal working in detail.
@saimrudula21402 жыл бұрын
Good explanation... Now I understood this topic clearly pls continue to upload more videos
@bsb770 Жыл бұрын
Very nicely done!!
@annygrijalba63762 жыл бұрын
Fantastic!
@aamirhamid47012 жыл бұрын
Clear explaination !! Thanku
@xaviercp22002 жыл бұрын
The best explanation
@austinaaron70186 ай бұрын
This is the best video🎉
@PouyaAtaei Жыл бұрын
great vide, thanks!
@mohammedkaram8606 Жыл бұрын
How did you do that? You are awesome, you definitely nailed it Thank you soooooooooo much for that illustration
@alexanderyelich817 Жыл бұрын
THANK YOU!
@norsie45 Жыл бұрын
thank you!
@ugaaga198 Жыл бұрын
This is excellent! Thank you!
@brod5152 жыл бұрын
@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
@joseocampo88152 жыл бұрын
Correct, routers are the devices that allow communication between different networks/subnets.
@icheckedavailability Жыл бұрын
Thank you for explaining the key exchange. I was tired of videos just saying "package is encrypted and then decrypted", I mean, of coursee but how?
@ovafett310010 ай бұрын
how do they end up with the same secret key if the private keys were never shared?
@kaushikkumarbora2 жыл бұрын
does that mean ssh is also prone to MITM if there is no involvement of certificate authority?
@AnonYmous-spyonmepls2 жыл бұрын
I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
@ThePhinista2 жыл бұрын
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
@Inyafacegerman Жыл бұрын
Anyone has been able to figure this out? I really dont get how MITM attack should not work if every key is sent over cleartext
@mrabea8336 Жыл бұрын
can you send me the slide show?
@KurlandHickory2 жыл бұрын
I think the speaker is Iranian I can tell from his accent I am Persian too