@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
Finally someone explained SSH key exchange practically. Thank you for your effort.
This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!
Agreed
Great explanation! I have taken hand written notes of this and took a photo, backed up to google drive as i think this is priceless!!
Perfect explanation for all playlist
Also using wireshark to view the protocol behavior is great really great
Now I clearly understand what's going behind ssh. Thank you for making such awesome video!!!
You explained that process perfectly! Thank you, so much! Excellent video!
Well explained. Looking for this from a long time. Thanks a lot...!!!
This video is perfect at 1.5 speed. Great work!
Full love and appreciation for this great effort
Appreciate the Wireshark inspection too!
such a transparent crystal clear concept explanation... Thank you
This is only video on UA-cam that explains SSH protocol internal working in detail.
Awesome! Wonderfully explained with packet capture.
Excellent explanation 👏👏 i have been looking for this detailed explanation!
Wonderfull explaination, thanks buddy!
Good explanation... Now I understood this topic clearly pls continue to upload more videos
Thank you so much for this playlist
Wait more ....
Great Explanation ! Congratulations !
Very well explained. Thank you!
This is the best video🎉
Outstanding explanation
@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
Correct, routers are the devices that allow communication between different networks/subnets.
Very nicely done!!
How did you do that?
You are awesome, you definitely nailed it
Thank you soooooooooo much for that illustration
Clear explaination !! Thanku
how do they end up with the same secret key if the private keys were never shared?
fantastic
The best explanation
great vide, thanks!
Thank you for explaining the key exchange. I was tired of videos just saying "package is encrypted and then decrypted", I mean, of coursee but how?
does that mean ssh is also prone to MITM if there is no involvement of certificate authority?
I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
Anyone has been able to figure this out? I really dont get how MITM attack should not work if every key is sent over cleartext
Fantastic!
This is excellent! Thank you!
THANK YOU!
thank you!
can you send me the slide show?
I think the speaker is Iranian I can tell from his accent I am Persian too
Should scratch any other explanation on SSH from internet forever and keep this alone.