9 - Cryptography Basics - SSH Protocol Explained

Поділитися
Вставка
  • Опубліковано 18 лис 2024

КОМЕНТАРІ • 42

  • @Andy-ee9ft
    @Andy-ee9ft 3 роки тому +24

    Finally someone explained SSH key exchange practically. Thank you for your effort.

  • @kevinkimotho4589
    @kevinkimotho4589 28 днів тому

    Great explanation! I have taken hand written notes of this and took a photo, backed up to google drive as i think this is priceless!!

  • @loping4
    @loping4 Рік тому

    This is the absolute best explanation of this protocol in the whole internet! Amazing, outstanding job!

  • @mustafaabdelfattah2493
    @mustafaabdelfattah2493 3 місяці тому +1

    Perfect explanation for all playlist
    Also using wireshark to view the protocol behavior is great really great

  • @rahulanshan1371
    @rahulanshan1371 2 роки тому +1

    Now I clearly understand what's going behind ssh. Thank you for making such awesome video!!!

  • @demetriows1207
    @demetriows1207 2 роки тому +2

    Appreciate the Wireshark inspection too!

  • @Hacker_Baby
    @Hacker_Baby 2 роки тому +3

    You explained that process perfectly! Thank you, so much! Excellent video!

  • @MAYANKSHARMA_NITK
    @MAYANKSHARMA_NITK 3 роки тому +2

    Well explained. Looking for this from a long time. Thanks a lot...!!!

  • @hack0x90
    @hack0x90 Рік тому

    This is only video on UA-cam that explains SSH protocol internal working in detail.

  • @sensei0x01
    @sensei0x01 Рік тому

    Full love and appreciation for this great effort

  • @saaransh01
    @saaransh01 Рік тому

    such a transparent crystal clear concept explanation... Thank you

  • @carlosabiamer
    @carlosabiamer 2 роки тому

    This video is perfect at 1.5 speed. Great work!

  • @ankit7319
    @ankit7319 2 роки тому

    Awesome! Wonderfully explained with packet capture.

  • @sruhaana5096
    @sruhaana5096 3 роки тому +2

    Excellent explanation 👏👏 i have been looking for this detailed explanation!

  • @ilgizsimashev2354
    @ilgizsimashev2354 9 місяців тому

    Wonderfull explaination, thanks buddy!

  • @mustafaabdelfattah2493
    @mustafaabdelfattah2493 3 місяці тому

    Thank you so much for this playlist
    Wait more ....

  • @V1kT0R04
    @V1kT0R04 2 роки тому

    Very well explained. Thank you!

  • @ivanraineri6831
    @ivanraineri6831 2 місяці тому

    Outstanding explanation

  • @saimrudula2140
    @saimrudula2140 2 роки тому

    Good explanation... Now I understood this topic clearly pls continue to upload more videos

  • @brunomedeirosfraga
    @brunomedeirosfraga 3 роки тому

    Great Explanation ! Congratulations !

  • @bsb770
    @bsb770 Рік тому

    Very nicely done!!

  • @mohammedkaram8606
    @mohammedkaram8606 2 роки тому

    How did you do that?
    You are awesome, you definitely nailed it
    Thank you soooooooooo much for that illustration

  • @aamirhamid4701
    @aamirhamid4701 2 роки тому

    Clear explaination !! Thanku

  • @austinaaron7018
    @austinaaron7018 Рік тому

    This is the best video🎉

  • @PouyaAtaei
    @PouyaAtaei 2 роки тому

    great vide, thanks!

  • @ovafett3100
    @ovafett3100 Рік тому +1

    how do they end up with the same secret key if the private keys were never shared?

  • @icheckedavailability
    @icheckedavailability 2 роки тому

    Thank you for explaining the key exchange. I was tired of videos just saying "package is encrypted and then decrypted", I mean, of coursee but how?

  • @xaviercp2200
    @xaviercp2200 3 роки тому

    The best explanation

  • @ugaaga198
    @ugaaga198 2 роки тому

    This is excellent! Thank you!

  • @annygrijalba6376
    @annygrijalba6376 3 роки тому

    Fantastic!

  • @alexanderyelich817
    @alexanderyelich817 2 роки тому

    THANK YOU!

  • @kaushikkumarbora
    @kaushikkumarbora 3 роки тому +1

    does that mean ssh is also prone to MITM if there is no involvement of certificate authority?

    • @AnonYmous-spyonmepls
      @AnonYmous-spyonmepls 3 роки тому +1

      I’m thinking the same, if you manage to capture the initial key exchanges there has to be a way to decrypt messages. I’m not sure, but there is actual software developed to mine key exchanges from collected network traffic so I’m not really optimistic.

    • @ThePhinista
      @ThePhinista 2 роки тому +1

      I believe that as long as the client is able to verify the integrity of the servers static public key a MITM attack is impossible as the verification of the hash would fail.

    • @Inyafacegerman
      @Inyafacegerman 2 роки тому

      Anyone has been able to figure this out? I really dont get how MITM attack should not work if every key is sent over cleartext

  • @norsie45
    @norsie45 2 роки тому

    thank you!

  • @brod515
    @brod515 3 роки тому

    @2:53 how are your machine and linux machine on different ip's. how do they communicate on different networks. is this something to do without router settings.

    • @joseocampo8815
      @joseocampo8815 3 роки тому

      Correct, routers are the devices that allow communication between different networks/subnets.

  • @mrabea8336
    @mrabea8336 Рік тому

    can you send me the slide show?

  • @KurlandHickory
    @KurlandHickory 2 роки тому

    I think the speaker is Iranian I can tell from his accent I am Persian too

  • @SukuGeorge
    @SukuGeorge 5 місяців тому

    Should scratch any other explanation on SSH from internet forever and keep this alone.