Linux Security - SSH Security Essentials

Поділитися
Вставка
  • Опубліковано 5 вер 2024

КОМЕНТАРІ • 184

  • @MrGFYne1337357
    @MrGFYne1337357 3 роки тому +56

    Damn, making big moves. Good stuff man.
    Happy you're still teaching and doing good. Respect.

    • @HackerSploit
      @HackerSploit  3 роки тому +5

      Thank you for the support mate, I hope you are keeping well.

    • @djebabliazakaria4593
      @djebabliazakaria4593 2 роки тому

      How People Get Infected With Malicious Word Document[]:
      ua-cam.com/video/E-Xc_bQyG2c/v-deo.html

  • @AliciaSykes
    @AliciaSykes 3 роки тому +16

    Top tip, skip the first 8.5 minutes, the content starts to get started at 8:30

  • @ealtay93
    @ealtay93 3 роки тому +13

    Linux Security series is going to be amazing! Thanks for your hard work. Hope there will be video about securing the docker daemon and containers

    • @HackerSploit
      @HackerSploit  3 роки тому +2

      Thank you very much for your support, definitely, Docker security is a subject that interests me and I have been working on and learning containerization technology for a while now.

    • @morningstar3437
      @morningstar3437 3 роки тому +1

      @@HackerSploit you Kenyan?

    • @HackerSploit
      @HackerSploit  3 роки тому

      @@morningstar3437 Yes

  • @charlesalmadi9665
    @charlesalmadi9665 3 роки тому +3

    I stumbled upon the video, simple and straight forward. It helped me connect dots on SSH security using cryptographic keys. Keep them coming

  • @rycarr
    @rycarr 3 роки тому +1

    I know I’m late to it but I really appreciate these videos. They answer some questions I had for years and could never find a good explanation of how to perform the task or the information is aimed at configuring for a niche need.

  • @devigopi8305
    @devigopi8305 3 роки тому +3

    Your videos are aswome... so useful for my career. Thanks for making these videos. LOVE FROM INDIA

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @Akhan4u
    @Akhan4u 3 роки тому +1

    Appreciation in words will not make justice for this work ! ❤️ Thank you HackerSploit and Linode!

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @tonyfernandes216
    @tonyfernandes216 3 роки тому +2

    hey Alexis another great video, your teaching skills are simply out of this world I've learned more in your tutorials then my college and uni combined, if I have a power I would gladly give you The George Cross award

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @mainakray6452
    @mainakray6452 3 роки тому +4

    thank you very much. I was finding this kind of sysadmin stuff and then I got your video. Keep making these kinds of awesome videos...:)

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @MartinKamau-gs1st
    @MartinKamau-gs1st Рік тому

    You are a genius!! Am just a beginner and all these is pretty much overwhelming to understand (The cyber world as a whole).

  • @zurkoprekidac5721
    @zurkoprekidac5721 3 роки тому +10

    About best practices:
    Never share private key with the team, because you will never be able to determine who was logged, every user should have personal account with username and private key.
    In every ssh hardening video or tutorial the only focus is on sshd_config file, but very rarely anyone talks about weak cryptographic ciphers, weak keys... For strongest hardening crypto policy should be changed (weak ciphers should be removed): /etc/crypto-policies/back-ends/openssh.config

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @ghaffardar7565
    @ghaffardar7565 3 роки тому +5

    Finely We found a great teacher on youtube

  • @thanishnoor3234
    @thanishnoor3234 3 роки тому +1

    Thank you for making these kinds of videos

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @KICKASS4272
    @KICKASS4272 3 роки тому +2

    So glad I found this channel

  • @cryptoniccodict9566
    @cryptoniccodict9566 3 роки тому +1

    Hey man just want to say thank you so much for the content that you are providing :)

  • @HackerSploit
    @HackerSploit  3 роки тому

    Timestamps:
    0:00 Introduction to the series
    2:14 Video starts
    You can register for part 2 of this series here: event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&partnerref=website&eventid=2649692&sessionid=1&key=FDD7D40926383C11B3392509222D8368®Tag=1558905&sourcepage=register

  • @NoONE-bk7ud
    @NoONE-bk7ud 3 місяці тому

    this guy is underrated

  • @juul216
    @juul216 3 роки тому

    Amazing series altough i have a lot of overlap there are still many small tips n tricks in these videos i'll definetly use!

  • @nurai3928
    @nurai3928 3 роки тому

    Happy teacher's day you're my teacher 💓
    I'm the corn you replied in your discord 💓

  • @mrognib311
    @mrognib311 3 роки тому +1

    Thanks for doing this. Excellent!

  • @nicholastoo858
    @nicholastoo858 6 місяців тому

    Great teacher.

  • @ari178
    @ari178 Рік тому

    Excellent series. Thank you

  • @billapatigoutham6066
    @billapatigoutham6066 3 роки тому +1

    Very informative 👍

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @claudebernard3442
    @claudebernard3442 Рік тому

    thank you for your help, i register on linode

  • @barlommit859
    @barlommit859 3 роки тому

    i love leaning from your channel , good work keep it up

  • @angell.1578
    @angell.1578 3 роки тому

    New subcriber here. Nice videos you do, you explain everything and that make us a very simple view, thank you.

  • @codeindustries6983
    @codeindustries6983 3 роки тому +2

    Love you from India 😘😘

  • @silentkille4
    @silentkille4 3 роки тому +1

    one of the best videos it was so helpful thanks mate

  • @_labib
    @_labib 3 роки тому

    Fantastic!

  • @abhishekrajput9434
    @abhishekrajput9434 3 роки тому +1

    Nice.👍

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @shubhamsehgal2336
    @shubhamsehgal2336 3 роки тому +1

    OP voice...You can replace martin Taylor or alan smith

  • @akashh8583
    @akashh8583 3 роки тому

    Best Explanation && it helps a lot to improve linux knowledge

  • @davehans9262
    @davehans9262 3 роки тому +1

    great stuff....first time here

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @allenxd
    @allenxd 3 роки тому +2

    i love you man.

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @luqmanhamdan9285
    @luqmanhamdan9285 3 роки тому

    This is great stuff. Keep up the work 👍👍👍

  • @hexrays6150
    @hexrays6150 3 роки тому

    Very good channel. And nice voice. Greetings from germany

  • @h8handles
    @h8handles 3 роки тому +1

    Hackersploit at it again!

  • @tonyfernandes216
    @tonyfernandes216 3 роки тому +3

    your tutorial is simply awsome man. can I set up a free account for learning

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @richardkicklighter8280
    @richardkicklighter8280 3 роки тому

    Outstanding video.

  • @FakedPvp
    @FakedPvp Рік тому

    Another note is put a password on the key so a random that has access to the system. use the key to get in to the server

  • @chromerims
    @chromerims 2 роки тому

    @HackerSploit Thank you very much for your excellent videos. Why are there two SSH keys at 18:58? Was one left over from an earlier dry run?

  • @mohammedsalahudheen7288
    @mohammedsalahudheen7288 3 роки тому

    Your video really awesome and Helpful

  • @eonraider
    @eonraider 3 роки тому

    There's something wrong in the explanation on public-private key authentication around the 20:10 mark. In actuality the SERVER generates and sends a hashed random string encrypted using the client's PUBLIC key. If then the client is able to decrypt such hashed data it necessarily proves possession of the corresponding private key, thus authenticating itself (because we assume that the private key has been kept private) AFTER the server receives the decrypted hash from the client and compares it with the original data it generated during the start of the process. At this point, if there is a match between the information the server sent to the client and the response received from it, the server is safe to assume that whatever party is requesting this connection is the one in possession of the private key that's mathematically related to the public key it holds as one of those listed in its authorized_keys file. That's, by the way, the reason why the public key has to be sent to the server PRIOR to a key-based authentication can take place (for it must have knowledge of the public key itself if it is to issue the challenge to the connecting party). The explanation given in the video was misleading, as far as I know.

    • @HackerSploit
      @HackerSploit  3 роки тому

      Thank you for pointing this out, I will be making the corrections as soon as possible.

  • @theopbro8691
    @theopbro8691 3 роки тому +1

    Amazing Work!!!!!!!

  • @skolarii
    @skolarii 3 роки тому +2

    At 21:08 you mention you "encrypt with private key and decrypt with public key".. Isn't it the other way around?

    • @devnullification
      @devnullification 3 роки тому

      It's that way. The encryption is just called "signing", because encrypting stuff with the private key is what signing is

    • @skolarii
      @skolarii 3 роки тому

      @@devnullification so anyone with the public key can decrypt the traffic?

    • @devnullification
      @devnullification 3 роки тому +1

      @@skolarii No - anyone with the public key can check if the signature is correct. The traffic is encrypted with another key, which is changed each session and during longer sessions. That's a symmetric key exchanged via a key exchange mechanism (like diffie hellmann). That part is the same for password logins. The public/private key pair is just used for authentication.

    • @skolarii
      @skolarii 3 роки тому +1

      @@devnullification i understand now.. thank you!

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @josekiki1587
    @josekiki1587 3 роки тому

    It is a great course with great super deep explanations for understanding your great cyber mentor. I have a question, if I have 8Gb memory RAM in my pc how many machines can I create in my Virtualbox machine or I can only create one machine in it e.g like only kali Linux and maybe what if I want an ubuntu machine too.

  • @perseotitan9963
    @perseotitan9963 3 роки тому

    Muy buen video, gracias!!!

  • @g-net7646
    @g-net7646 3 роки тому

    Great tutorial, thank you!

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @pedropereira5609
    @pedropereira5609 3 роки тому +2

    Hello there, you presented us with a great explanatory video, but I believe you made a mistake. In SSH the public key is the one that encrypts not the private.

    • @HackerSploit
      @HackerSploit  3 роки тому

      Thank you for pointing this out, i will make the necessary correction.

    • @mauriceedwards4298
      @mauriceedwards4298 3 роки тому

      Great catch! Digital signatures are run backwards though - the sender's private key is used to sign (by encrypting a hash of the original message), and his public key is used both to verify that the sender is exactly as advertised and that the message has not been altered after it was sent.

  • @ru31k32
    @ru31k32 3 роки тому +2

    Sorry, am confused.
    Isnt the public key used to encrypt and the private used to decrypt??
    20:38

    • @DHIRAL2908
      @DHIRAL2908 3 роки тому +2

      Public key can decrypt something encrypted by it's paired private key!

    • @devnullification
      @devnullification 3 роки тому

      @@DHIRAL2908 Yeah, but that is actually not called encryption, but that's what digital signatures are.

    • @ru31k32
      @ru31k32 3 роки тому

      @@DHIRAL2908 Thanks!! :D I found this when looking for an answer. www.tutorialspoint.com/difference-between-private-key-and-public-key
      As you said, both can encrypt and decrypt.

  • @-argih
    @-argih 3 роки тому +1

    Windows 10 has the openSSH client by default since last year

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @JohnAlanWoods
    @JohnAlanWoods 3 роки тому +1

    How can you recommend RSA based cryptography over ECC, specifically over ed25519? This is certainly not how I would recommend securing SSH for enterprise.

  • @PetritK10
    @PetritK10 3 роки тому

    Thank you

  • @raysaul
    @raysaul 3 роки тому

    Great way of explaining things!!!
    Now how will you share the rsa key securely to the dev team?

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @ClaudioPallone
    @ClaudioPallone 3 роки тому

    I really enjoyed the video. Thanks. How would I get Putty to work with the key now? Do I have to give the private key to the windows user? whre does the user store the key? Strange you said we have to share the private key. I though the private key should be kept in the server and only the public key should be shared.

  • @sundar3357
    @sundar3357 3 роки тому +1

    Now only I am seeing the man behind the voice

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @minegamer369
    @minegamer369 3 роки тому +2

    Is there a way to use ssh keys gen on linux and use them on windows(with putty)?

    • @chrissutton6235
      @chrissutton6235 3 роки тому

      You can. PuTTy likes their format, but you can use puttygen to import the pem and convert to ppk. Or you can just use puttygen to generate the key pair. Puttygen has less options when generating keys, but you can do rsa 4k and other options.

  • @Virlo
    @Virlo 3 роки тому +1

    But if you are on outside somewhere else and you need to login quick in the server on a different pc then you can’t.. can you bring a USB with the private key on it and then have access?

    • @calvinu3601
      @calvinu3601 3 роки тому

      Of course you can. Just specify the private key with option -i or copy it to ~/.ssh/ (dont use the second option on a public pc of course XD)

  • @kyawboss1313
    @kyawboss1313 3 роки тому

    Thank U bro

  • @TechiewithMoon
    @TechiewithMoon 3 роки тому

    This is Good stuff

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @zwyklyuser44
    @zwyklyuser44 3 роки тому

    Thanks !!!!!!

  • @badplayer4348
    @badplayer4348 11 місяців тому

    Dumb question but wouldn't you add the new dev user to sudoers anyway? how else can you give them access and permissions

  • @H4Xtorpedo
    @H4Xtorpedo 3 роки тому

    Hi
    Please i want to ask a question
    Is there any way that i could know about how many devices are present near me or selected area

  • @hanko1
    @hanko1 3 роки тому

    Bro Please can you make just short video onVishing and Smishing

  • @utkarshgupta6258
    @utkarshgupta6258 3 роки тому

    ❤🇮🇳🇮🇳 from Indian

  • @game_addictions
    @game_addictions 3 роки тому

    how to know other person information through hotspot connection
    It's possible or not

  • @sumitsingh-ys6ew
    @sumitsingh-ys6ew 3 роки тому

    man, u really hit hard : )

  • @calciumdd7696
    @calciumdd7696 3 роки тому

    nice

  • @TheVinnythestick
    @TheVinnythestick 3 роки тому

    Is this a ssh tutorial or an advertisement for linode?

  • @abdullahihussein8860
    @abdullahihussein8860 3 роки тому

    Good

  • @ClaudioPallone
    @ClaudioPallone 3 роки тому +1

    Hi, where can watch part 2 of this tutorial? cheers

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @MaihymCG
    @MaihymCG 3 роки тому

    I'm a little confused here, I don't think you uncommented PubKeyAuthentication and set it to "yes". Wouldnt this be required as well as a restart of the ssh service to be put into effect? Just feels like you missed a step unless you did it and I just didnt notice.

    • @zemba2744
      @zemba2744 3 роки тому

      The lines that are commented out by default indicate the default value. So even though he did not uncomment PubKeyAuthentication it is still enabled (and has been from the beginning) because its default value is yes.

  • @DaPanda19
    @DaPanda19 3 роки тому

    After running "ssh-copy-id" from my linux box I still had to enter my password and hoping it was something on my end i locked myself out... what did I do wrong? :/

  • @dhakanednyanesh
    @dhakanednyanesh 3 роки тому +1

    What If we lost our private key then how can I recover, because we already denied root access?

    • @devnullification
      @devnullification 3 роки тому +2

      You can (and should) use multiple keypairs. You want one for each dev team member and you likely want a securely stored away one for escrow.

  • @026-johnstephen.j4
    @026-johnstephen.j4 6 місяців тому

    How do I watch part 2 of this video, link is expired, please help

  • @islem1263
    @islem1263 3 роки тому +3

    when you use ssh-copy-id does it store your keys in the server's dev account .ssh folder?

    • @ManSplained22
      @ManSplained22 3 роки тому

      no its in your local machine

    • @johnd5736
      @johnd5736 3 роки тому +4

      It copies the public key you specify and adds it to .ssh/authorized_keys for the user on the server you are copying to

  • @AmirAli-tl4sg
    @AmirAli-tl4sg Рік тому

    hello sir, how to login by putty using public key

  • @elaprendiz1504
    @elaprendiz1504 3 роки тому

    Hello I try to configure the openssh server, to connect from a Windows using Plink.exe but I can't.
    Any recommendation?
    It's on HTB's Buff machine

  • @alphaone81
    @alphaone81 3 роки тому

    Disabling password authentication does permit public key logins + password configured when we generate public keys? Thanks

    • @chrissutton6235
      @chrissutton6235 3 роки тому

      Im not sure i completely understand you question. If you are referring to the pw used to encrypt you priv key, that has no bearing on the ssh server config. That just encrypts your priv key locally so its not plain text. You basically decrypt the priv and store a plain text version in memory on the client, so your ssh client is still using it decrypted, while its encrypted on disk.

  • @venkatesh4318
    @venkatesh4318 3 роки тому

    Bro when I am installing a script it's asking GitHub user name and password bro and I am entering that it's showing no repository found can u help me this bro

  • @naveensaradhi6923
    @naveensaradhi6923 3 роки тому

    Bro please do hackerone or bugcrowd bugs hunting videos

  • @valinoce
    @valinoce 3 місяці тому

    though SUSE YAST SUPPORTS GUI for configurations, one should still know the config files maniputations in texts, I suppose!!! hahaha!!!

  • @abdulnasmi
    @abdulnasmi 3 роки тому +1

    ❤️😊

  • @kr4k3nn
    @kr4k3nn 3 роки тому

    Does private key is specific to a computer means if i have the private key of a computer, can i login to that account from another computer?

  • @magic2267
    @magic2267 3 роки тому +3

  • @obscenity
    @obscenity 3 роки тому

    should update your virtualbox vm to gorilla instead of fossa

  • @technicalgamer7668
    @technicalgamer7668 3 роки тому

    Sim card scan tuturoial pls

  • @h8handles
    @h8handles 3 роки тому

    so when you ran the ssh-copy......i only got 1 key why did you get two?
    if you have time to answer.

    • @jacobboomgaarden
      @jacobboomgaarden 3 роки тому

      it appended multiple identities from his host system into the ssh server's authorized keys file because he likely had more than one identity file on his host machine. To ensure ssh-copy-id only copies over the desired identity, I think you want to use the "-i identity_file" option.

  • @TheShyampo
    @TheShyampo 3 роки тому

    Sir, are you also getting strikes like all other infosec youtuber getting ???? I'm a bit worried what if this channel terminated

  • @guyallo3803
    @guyallo3803 3 роки тому

    hello sir , pls add english subtitles in ALL your videos .

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

    • @kithenry
      @kithenry 2 роки тому

      Tap cc in the top right corner bruh...
      This guy is as eloquent as f*** so...

  • @player-te8tf
    @player-te8tf 3 роки тому +1

    Alexis 🥺🥺

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @sat_stacker
    @sat_stacker 3 роки тому +1

    Hi I love your videos. I am wondering how to prevent open ssh from reporting so much information.
    Example
    curl ip:22
    SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2
    curl: (56) Recv failure: Connection was reset
    Its exposing my operating system, and ssh versions.
    thank you

    • @jacobboomgaarden
      @jacobboomgaarden 3 роки тому

      serverfault.com/questions/216801/prevent-ssh-from-advertising-its-version-number/767445 ... you can probably remove the distro OS information using some values in the /etc/ssh/sshd_config file, but the SSH version info is likely compiled into the sshd binary itself.

  • @naveensaradhi6923
    @naveensaradhi6923 3 роки тому +1

    Bro please can u reply

  • @pipi_delina
    @pipi_delina 3 роки тому

    The URL is broken

  • @chuell8099
    @chuell8099 3 роки тому

    BR

  • @ankylosis751
    @ankylosis751 3 роки тому +1

    whonix?

    • @vivekpal728
      @vivekpal728 3 роки тому

      ua-cam.com/video/CpPYbCkNm4g/v-deo.html

  • @A_to_Z-Information
    @A_to_Z-Information 3 роки тому

    Sir please made vedio of android hacking please please

  • @legendigl8291
    @legendigl8291 3 роки тому

    Bro I have one tought

  • @GabeTV9001
    @GabeTV9001 3 роки тому

    Darnn, 9 whole minutes of promotion

  • @muhammadaltaf4796
    @muhammadaltaf4796 3 роки тому

    Give me an alternative solution thnx