I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
Finally someone explained SSH key exchange practically. Thank you for your effort.
Great explanation! I have taken hand written notes of this and took a photo, backed up to google drive as i think this is priceless!!
This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!
Perfect explanation for all playlist
Also using wireshark to view the protocol behavior is great really great
Now I clearly understand what's going behind ssh. Thank you for making such awesome video!!!
Appreciate the Wireshark inspection too!
You explained that process perfectly! Thank you, so much! Excellent video!
Well explained. Looking for this from a long time. Thanks a lot...!!!
This is only video on UA-cam that explains SSH protocol internal working in detail.
Full love and appreciation for this great effort
such a transparent crystal clear concept explanation... Thank you
This video is perfect at 1.5 speed. Great work!
Awesome! Wonderfully explained with packet capture.
Excellent explanation 👏👏 i have been looking for this detailed explanation!
Wonderfull explaination, thanks buddy!
Thank you so much for this playlist
Wait more ....
Very well explained. Thank you!
Outstanding explanation
Good explanation... Now I understood this topic clearly pls continue to upload more videos
Great Explanation ! Congratulations !
Very nicely done!!
How did you do that?
You are awesome, you definitely nailed it
Thank you soooooooooo much for that illustration
Clear explaination !! Thanku
This is the best video🎉
great vide, thanks!
how do they end up with the same secret key if the private keys were never shared?
Thank you for explaining the key exchange. I was tired of videos just saying "package is encrypted and then decrypted", I mean, of coursee but how?
The best explanation
This is excellent! Thank you!
Fantastic!
THANK YOU!
does that mean ssh is also prone to MITM if there is no involvement of certificate authority?
I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.
I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.
Anyone has been able to figure this out? I really dont get how MITM attack should not work if every key is sent over cleartext
thank you!
@2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.
Correct, routers are the devices that allow communication between different networks/subnets.
can you send me the slide show?
I think the speaker is Iranian I can tell from his accent I am Persian too
Should scratch any other explanation on SSH from internet forever and keep this alone.