Ya can't just go around tell the normies about elite hacker tools like ssh. This is gonna get you another strike. Don't you know the first rule about ssh is shh.
Elite hacker tool wtf, i like this comment because it sits on the line of it being either 8 layers of irony or being made by a 6yo thanks for this masterpiece lmao
It would be great if you could do more of these informative style videos. I suppose the majority of your viewers are probably technically proficient so perhaps it wouldn't be worth it but I think you have an excellent way of explaining a topic without being condescending. It's nice to watch someone explain something without stopping for every tiny detail, but covering the concept in a way that people can understand and develop as a platform for their learning. Either way, great video Outlaw.
I agree! His style of presentation is informative and enjoyable. Perhaps a second channel would be good? I'm still new to computer science topics and am trying to get out of the 'I don't know what I don't know' phase by absorbing as much as I can, so this video was great.
I started watching this channel because of the technically informative videos. Now I watch this channel for multiple kinds of informative videos. I just hope Mr. Outlaw keeps churning out videos for us to learn stuff
ssh is a life safer. My use cases - Managing my servers. - ssh config file is super helpful. Instead of remembering multiple ip's and ports, I can assign it a simple name. - Public-private key authentication is super easy. More secure and much convenient, instead of typing password each time you ssh. - Port forwarding with ssh to use a vnc viewer on my local desktop. Even tho servers are not meant to have a desktop environment, sometimes it is required (I use them with docker or lxd containers) - Port forwarding with ssh to test/configure the website before making it public. - Using sshfs, to mount a server directory on local machine. Kinda works like network storage.
I already knew a bit abt ssh so this video was more of a fun time killer. Super cool to hear examples of its versatility because when learning new topics I have a hard time grasping just how many places you can apply them.
I am needing to use this with my Raspberry pi for a class project, having one of my favorite youtubers in this field explain how it works makes it even better
You've probably used ssh-keygen to create a private and public key file, right? I also assume you need to input your password when you log into your pi? Use ssh-copy-id to copy your public key to the pi. You'll probably have to change your local config, but it's sooo nice not to type your password every time! :D
Aside from the bloat free, direct, and well articulated information you present every time... That creepy Joe meme at 2:38 is why you’re my favorite person on RUclips
In late 1990's, network was simple. PC's were connected to 'HUB', and it was very easy to 'sniff' connections. With Slackware Linux, I used program called 'sniffit' and I able to 'see' every connections in the network. IRC was very popular, and I able to 'see' all the chats and sometime I pranked them. :) SSH not just replaced the rsh or rlogin, but also ftp and rcp too. Thank you.
Maybe a better idea of what padding would represent in your analogy would not to mix in decoy packages, but to use the same package size for each item you receive, so you could not theoretically infer information about the object inside by its size
How does it do that? I was thinking it’d be more like putting rocks in the packages. But is this standard weight large enough so that no packet will need to be greater than it?
Another really nice use of SSH is debugging software, especially interop software where more than one programming language and runtime is used. Got a lot of mileage out of it for debugging some C# interop recently when the existing debuggers for that just weren't giving low enough level of information. Kept an SSH session open monitor the specific portions of the logs involved on another machine but could have just as well done it from the machine itself since SSH works the same locally as it does remotely.
@@kreuner11 basically TeamViewer for command line Yeah there are other options but watch or inotify over ssh works very well for this use case (monitoring logs)
Not only did I really enjoy this, but I also learned a lot. Started from the creation of ssh to modern ssh, all while being super concise. Thanks a lot man!
Thanks as always for this. Love learning about this kind of thing even though I already know a lot about tech didn't know much about SSH except is was secure thanks!!!
There's a specific reason for why compression is added last due to how compression before encryption introduces some recognizable patterns, even though it might even be detrimental to the achievable level of compression. But safety first! :)
Just learned about SSH but very informative of the in depths, thank you mental outlaw
2 года назад+2
a good topic to follow would be to teach what are ssh tunnels and how to use them. they are very useful for the management of local network resources and yet most linux users i talked so far never used them.
Haha you wish. They aren't even teaching standard stuff that every single person will have to know. The school system is a failure in everything but the intention behind it.
In 1997 I had a direct ethernet connection from my apartment to the university network. I used some aplication (can't remember the name) to get the X from the university unix computers to my linux computer. It was all unsecure telnet connections. We had hundreds of students with their computers sharing pics, music and whatever in their unsecure FTP connections. Damn, those were crazy times, haha.
This was a great video. You should do more of these. Maybe one about how asymmetric encryption is used to negotiate the connection and exchange the symmetric key?
You could have mentioned scp which allows file copies between hosts via ssh, and is super useful for those times you want to move files but can't be arsed setting up nfs.
Oooooh and authorized_keys versus password authentication, once you have a key you can zip between loads of hosts without ever having to type your password again :D
Good evening, Mr. Outlaw. Any chance you could do a video about port forwarding? My suddenly stopped seeding and supposedly my port is not forwarded. I'm too smooth-brained about networking to figure it out properly.
Port forwarding is done on your router and might be called something different depending on what router you have. There's a website that breaks it down pretty simply.
Very nice explanation. As a linux ssh newbie I found your explanation very informative. I followed ya on Odysee just in case the algorithym gets ya. . .
What I hoped to learn (which I can't find anywhere) is how do both parties exchange keys without outsiders listening in which will allow to however listening in on the key exchanges to decrypt everything.
Thanks a lot, and the video has (almost) prefect timing personally for me. I was wondering about how secure the secure shell is, and you helped me get rid of most of my worries. 👍🏻 Though, I'm still unsure if the initial credentials can be intercepted - if an attacker sniffs packets as I perform the very first thing: establishing connection (and, later, providing my credentials).
I’m basically a boomer, with only enough computer smarts to be safe. I don’t normally really care about the minutiae of computers. So why do I really like your videos explaining it?
Hey mental outlaw, could you make a video on subnetting and subnet masks please? Working on the Comptia Network+ Certification and I just really struggle to wrap my hands on subnetting well. Thanks!
So realllll I’ve been following bro for a minute too. Is kind of convenient he made this videos about ssh while the back door was active but as soon as it got found Outlaw just made a new video talking about it
Liked, comment, but my friends would give me that annoyed face if i shared. Still. no matter how many times i study and learn about SSH, i still come back to these videos and learn it again. *mainly because i always forget*
How do the client and server know how to use the same encryption/decryption methods? Is that info sent, and what stops a man-in-the-middle getting that info then intercepting packets unencrypting them and then reencrypting them? 😕
Do one on the Nym network. They use sphinx packets like the lightening network, reorder the packets, use decoy traffic and adjustable timing delay to defeat timing correlation
My only experience with SSH has been accessing the command line on my Pi. I want to eventually set up some cameras and connect them to MotionEyeOS or something. Getting a visual is going to be essential, so I'd love to see a tutorial.
Interestingly still around 2005 or so - I found several servers running Telnet with usernames/paswords in a very basic dictionary that were trying to brute-force my former server through SSH through a simple dictionary. Even back then 17 years ago I was puzzled by someone using Telnet. I guess it was the usual - someone gets into a server & tries the same from that newly owned server on your server. I do hope no-one is running Linux servers out there with Telnet exposed.
I didn't know how SSH works. I still don't know how SSH works. All symmetric encryption ciphers use the same key for encrypting and decrypting data, which means the sender and the receiver must both have the same key. So how does SSH allow both ends of the connection to agree on and use the same key?
I didn’t know how SSH works. Now I do. Thanks Mr Outlaw.
I didn’t even know it existed. Thank you Mr. Outlaw.
Yes, now for the other mystery in the life..does anyone know what a woman is?
@@BrokeBillionare they're a myth
@@BrokeBillionare is that some sort of forbidden torrent technique?
@@AshleyRiot I don’t know, I am not a biologist.
Ya can't just go around tell the normies about elite hacker tools like ssh. This is gonna get you another strike. Don't you know the first rule about ssh is shh.
legendary commentary
It's a scp
Elite hacker tool wtf, i like this comment because it sits on the line of it being either 8 layers of irony or being made by a 6yo thanks for this masterpiece lmao
"Elite hacker tool" boy what
@@devilfrog4209
The joke 💨💨💨
🤓
SSH is one of those concepts I've struggled with a bit in my IT studies. This video explained it perfectly for me. Thanks Mental Outlaw.
It would be great if you could do more of these informative style videos. I suppose the majority of your viewers are probably technically proficient so perhaps it wouldn't be worth it but I think you have an excellent way of explaining a topic without being condescending. It's nice to watch someone explain something without stopping for every tiny detail, but covering the concept in a way that people can understand and develop as a platform for their learning. Either way, great video Outlaw.
I agree! His style of presentation is informative and enjoyable. Perhaps a second channel would be good?
I'm still new to computer science topics and am trying to get out of the 'I don't know what I don't know' phase by absorbing as much as I can, so this video was great.
I also like this
I started watching this channel because of the technically informative videos. Now I watch this channel for multiple kinds of informative videos. I just hope Mr. Outlaw keeps churning out videos for us to learn stuff
I work in the industry and don’t know a lot of this as it’s not immediately related to my role, so, totally agree!
ssh is a life safer. My use cases
- Managing my servers.
- ssh config file is super helpful. Instead of remembering multiple ip's and ports, I can assign it a simple name.
- Public-private key authentication is super easy. More secure and much convenient, instead of typing password each time you ssh.
- Port forwarding with ssh to use a vnc viewer on my local desktop. Even tho servers are not meant to have a desktop environment, sometimes it is required (I use them with docker or lxd containers)
- Port forwarding with ssh to test/configure the website before making it public.
- Using sshfs, to mount a server directory on local machine. Kinda works like network storage.
I already knew a bit abt ssh so this video was more of a fun time killer. Super cool to hear examples of its versatility because when learning new topics I have a hard time grasping just how many places you can apply them.
ssh tunneling is fucking brilliant
@@TurkeyOW same. Learning the application of a topic is a bit tough when you're starting out. It's the fun-est bit tho... applicability is key 🔑👌
Another use: logging into a local vm in your regular terminal
another fun thing: proxy jump through a bastion host
I am needing to use this with my Raspberry pi for a class project, having one of my favorite youtubers in this field explain how it works makes it even better
You've probably used ssh-keygen to create a private and public key file, right? I also assume you need to input your password when you log into your pi?
Use ssh-copy-id to copy your public key to the pi. You'll probably have to change your local config, but it's sooo nice not to type your password every time! :D
@@NostraDavid2 thanks for the tip, I’ll definitely be sure to try that
Aside from the bloat free, direct, and well articulated information you present every time... That creepy Joe meme at 2:38 is why you’re my favorite person on RUclips
And it's a lot more cursed if you know the character in that meme
Creepy Joe sniffing that poor unencrypted packet 😥
😅
In late 1990's, network was simple. PC's were connected to 'HUB', and it was very easy to 'sniff' connections. With Slackware Linux, I used program called 'sniffit' and I able to 'see' every connections in the network. IRC was very popular, and I able to 'see' all the chats and sometime I pranked them. :)
SSH not just replaced the rsh or rlogin, but also ftp and rcp too.
Thank you.
I learned about SSH by jailbreaking my Apple products years ago. Thanks for spreading the love
You are doing great, I highly appreciate videos of content creators like you. Sending Praise and Love to you, keep going
use it every day, still learned something, the sign of good content!
Maybe a better idea of what padding would represent in your analogy would not to mix in decoy packages, but to use the same package size for each item you receive, so you could not theoretically infer information about the object inside by its size
This.
How does it do that? I was thinking it’d be more like putting rocks in the packages. But is this standard weight large enough so that no packet will need to be greater than it?
Just wanted to drop by and say your videos helped me get SEC+ certified. Thanks 👍
Thanks to SSH, SFTP exists. It's the same as FTP but through SSH. And it doesn't need the other server to run a FTP server!!!!
scp and rsync are both very helpful.
Another really nice use of SSH is debugging software, especially interop software where more than one programming language and runtime is used. Got a lot of mileage out of it for debugging some C# interop recently when the existing debuggers for that just weren't giving low enough level of information. Kept an SSH session open monitor the specific portions of the logs involved on another machine but could have just as well done it from the machine itself since SSH works the same locally as it does remotely.
Why do you need ssh for that?
@@kreuner11 basically TeamViewer for command line
Yeah there are other options but watch or inotify over ssh works very well for this use case (monitoring logs)
@@satibel I mean, for local logs you can use tail -f
I would really appreciate more videos like this
A bit calmer and more focused than usual.
this is the content corporate youtube wants!
Not only did I really enjoy this, but I also learned a lot. Started from the creation of ssh to modern ssh, all while being super concise. Thanks a lot man!
Very important tool that one just uses without stopping to appreciate what a nice thing it is!
Pretty solid explanation bro, thank you.
Thanks as always for this. Love learning about this kind of thing even though I already know a lot about tech didn't know much about SSH except is was secure thanks!!!
Pleasant narration. Keep up the good work. 👌🏻
Perfect video for me as an ongoing systems engineer. Thanks!
Wow, this was really well done. Concise and to the point.
Please post more of this content. It's within your level of expertise :)
I usually read stuff about this but i might start checking out more videos like these, look very interesting, Thanks!
Ay G ion dub I didnt even know what u on till I saw this video thanks dawg u da real one G keep it up and stay up.
The first time I heard about ssh I remember saying: Surely I should abuse it
An here I thought I knew a thing or two about SSH. Nope. Learned a ton from this video. Many thanks!
There's a specific reason for why compression is added last due to how compression before encryption introduces some recognizable patterns, even though it might even be detrimental to the achievable level of compression. But safety first! :)
thank u, been dealing with some crazy stuff lately this helps
This vid looks nice and inoffensive, sure, but also it's useful and informative in its own right. Thanks for making it.
This is all false. SSH is a command what makes your computer run quieter
😂
And thats why its an abbreviation for "Silent Server Hush"
😂😂😂😂😂
Sshhh🤫
watch out man youtube might decide that controlling another device from your computer is encouraging hacking.
Just learned about SSH but very informative of the in depths, thank you mental outlaw
a good topic to follow would be to teach what are ssh tunnels and how to use them.
they are very useful for the management of local network resources and yet most linux users i talked so far never used them.
0:25 ah yes, SHH
everybody's favorite remote shell protocol
The TCP/UDP water analogy was hilarious.
I knew a few use cases for ssh but what it is is often glossed over. Thanks for the video!
Outstanding video, great work Mental sir
I laughed so hard at 2:38.
Well done, my friend, well done.
You made me discover the -X argument for SSH, thank you, this is amazing
Finally, useful video! This is better than biased rant like what Kenny usually did, tbh
Those photos and graphics sure take me back!
And again, thank you for educating us, normies, my humble king. Love you 💕
this is the type of information that needs to be taught in school
Haha you wish. They aren't even teaching standard stuff that every single person will have to know. The school system is a failure in everything but the intention behind it.
American schools don't want to mold utilitarians, they want lap dogs.
@@ghosthunter0950 absolutely, but there isn't a whole lot we can realistically do about it
It already is lol
SSH is my favorite function of linux. It's the best way to manage a server rack all the way down to the router.
In 1997 I had a direct ethernet connection from my apartment to the university network. I used some aplication (can't remember the name) to get the X from the university unix computers to my linux computer. It was all unsecure telnet connections. We had hundreds of students with their computers sharing pics, music and whatever in their unsecure FTP connections. Damn, those were crazy times, haha.
Fantastic video! It was easy to follow and didn't' bore me at any point.
This was a great video. You should do more of these. Maybe one about how asymmetric encryption is used to negotiate the connection and exchange the symmetric key?
You could have mentioned scp which allows file copies between hosts via ssh, and is super useful for those times you want to move files but can't be arsed setting up nfs.
Oooooh and authorized_keys versus password authentication, once you have a key you can zip between loads of hosts without ever having to type your password again :D
Good evening, Mr. Outlaw. Any chance you could do a video about port forwarding? My suddenly stopped seeding and supposedly my port is not forwarded. I'm too smooth-brained about networking to figure it out properly.
Port forwarding is done on your router and might be called something different depending on what router you have.
There's a website that breaks it down pretty simply.
Also: on some ISP supplied routers, it's very difficult or even impossible to port forward. I ended up buying my own equipment because of it.
@@whitewolf262 Yeah, on my sky router you need to pay for static ips and port fotwarding
@@sunglocto Thats insane you would need to pay for static IP's! Next thing to happen is force /30 instead of the standard /24 for the subnet.
@@tworiversfolk923 in the last 10 months i took two networking classes at my university and now i know what that means!
the matrix background behind the packet breakdown had me rolling
Thanks for the video Mr. Outlaw! Have a good one 😃
Very nice explanation. As a linux ssh newbie I found your explanation very informative. I followed ya on Odysee just in case the algorithym gets ya. . .
I know I can read how X11 works on Wikipedia, but having Mental Outlaw explain it would be way cooler
1:00 is that Omar Epps in the green jacket?!?
This video is outstanding and packed with knowledge, but is no one going to talk about the Nagisa cameo? MentalOutlaw trutly is a man of culture.
That TCP UDP picture was spot on. Funny lol
Using this video a couple years later to educate myself so I can remote in to my own PC to access a local AI model I installed through terminal.
It's great to have you back!
Damn how do you put out so many vids. My fave channel!
Great explanation and illustration.
Thx. Its go to understand how what your doing works
"back in the early 90s", proceeds to show a shot from the movie juice, love it.
Wow. This is the perfect SSH primer. -- a Grey Beard who would have picked you up on the tiniest mistake, but found none
I've used Linux since more than 12 years ago, however I've never read how SSH works. Thank you for making this!
I recently just installed bitvise to host an ssh server for file sharing, works great, I recommend that if you Wana host ssh on windows
"Sniffing it.". Chef's kiss.😁
please do more of these style of this videos along with your normal stuff!!
I was looking for a good explanation of the protocol yesterday, get out of my walls
@0:25 you spelled SSH wrong. Love your content so far
What I hoped to learn (which I can't find anywhere) is how do both parties exchange keys without outsiders listening in which will allow to however listening in on the key exchanges to decrypt everything.
3:15 this dude is correct. I be watching all my neighbors receive their packages. Wondering is that the mother load to take or some nail polish
Bro explained this better than all my instructors 💀
Thanks a lot, and the video has (almost) prefect timing personally for me.
I was wondering about how secure the secure shell is, and you helped me get rid of most of my worries. 👍🏻
Though, I'm still unsure if the initial credentials can be intercepted - if an attacker sniffs packets as I perform the very first thing: establishing connection (and, later, providing my credentials).
I never know if I should expect some useful tech info, or how to cook chicken...
Happy either way. 🖥+🔑+🖥 = ⚖
Well-presented and engaging.
X11 tunnel via ssh would be awesome video
I’m basically a boomer, with only enough computer smarts to be safe. I don’t normally really care about the minutiae of computers. So why do I really like your videos explaining it?
That image about TCP vs UDP is absolute gold hahahaha.
Came to learn and left with mental SSHing into our Heart's.
Minor critique is at the 0:29 mark, the animation shows SHH not SSH
Can i download the full series of "the sopranos"?
Great video. Just wanted to say that websockets also use TCP
Hey mental outlaw, could you make a video on subnetting and subnet masks please? Working on the Comptia Network+ Certification and I just really struggle to wrap my hands on subnetting well. Thanks!
i second this. i always have to look it up for the few times i use it, and then immediately forget it 5min later.
An easy way to learn subnet is by using nmap and adding the /1 through /34 after the target IP address. that's how I learned
@@TheNickBrotherhood ill try that, thanks
You forgot to mention the part where sshd login uses a corrupted version of the xz util to backdoor your system
id be suspicious if someone calls xz utils out one year in advance
So realllll I’ve been following bro for a minute too. Is kind of convenient he made this videos about ssh while the back door was active but as soon as it got found Outlaw just made a new video talking about it
Behavior definitely seems mad federal to me
Liked, comment, but my friends would give me that annoyed face if i shared. Still. no matter how many times i study and learn about SSH, i still come back to these videos and learn it again. *mainly because i always forget*
Nice presentation
SSH is amazing, especially ssh tunneling. Saves so much headache.
How do the client and server know how to use the same encryption/decryption methods? Is that info sent, and what stops a man-in-the-middle getting that info then intercepting packets unencrypting them and then reencrypting them? 😕
0:25 it says SHH on the graphic, instead of SSH ^^
funny this is in my feed with all the CVE-2024-6387 stuff
lol love the memes, I'm subscribing
Do one on the Nym network. They use sphinx packets like the lightening network, reorder the packets, use decoy traffic and adjustable timing delay to defeat timing correlation
will u do a tutorial on how to run X11 over ssh?
My only experience with SSH has been accessing the command line on my Pi.
I want to eventually set up some cameras and connect them to MotionEyeOS or something.
Getting a visual is going to be essential, so I'd love to see a tutorial.
Interestingly still around 2005 or so - I found several servers running Telnet with usernames/paswords in a very basic dictionary that were trying to brute-force my former server through SSH through a simple dictionary. Even back then 17 years ago I was puzzled by someone using Telnet. I guess it was the usual - someone gets into a server & tries the same from that newly owned server on your server. I do hope no-one is running Linux servers out there with Telnet exposed.
Nicely put, thanks.
Do you have a video explaining what proxies do/are and the different types?
I didn't know how SSH works. I still don't know how SSH works. All symmetric encryption ciphers use the same key for encrypting and decrypting data, which means the sender and the receiver must both have the same key. So how does SSH allow both ends of the connection to agree on and use the same key?