How SSH Works

Поделиться
HTML-код
  • Опубликовано: 22 янв 2025

Комментарии • 463

  • @Toyking10
    @Toyking10 2 года назад +1450

    I didn’t know how SSH works. Now I do. Thanks Mr Outlaw.

    • @AshleyRiot
      @AshleyRiot 2 года назад +25

      I didn’t even know it existed. Thank you Mr. Outlaw.

    • @BrokeBillionare
      @BrokeBillionare 2 года назад +41

      Yes, now for the other mystery in the life..does anyone know what a woman is?

    • @itsdokko2990
      @itsdokko2990 2 года назад +8

      @@BrokeBillionare they're a myth

    • @AshleyRiot
      @AshleyRiot 2 года назад +31

      @@BrokeBillionare is that some sort of forbidden torrent technique?

    • @BrokeBillionare
      @BrokeBillionare 2 года назад +21

      @@AshleyRiot I don’t know, I am not a biologist.

  • @brianobey4368
    @brianobey4368 2 года назад +2059

    Ya can't just go around tell the normies about elite hacker tools like ssh. This is gonna get you another strike. Don't you know the first rule about ssh is shh.

    • @KatzRool
      @KatzRool 2 года назад +117

      legendary commentary

    • @davidkeys4284
      @davidkeys4284 2 года назад +11

      It's a scp

    • @Linuslkm
      @Linuslkm 2 года назад +114

      Elite hacker tool wtf, i like this comment because it sits on the line of it being either 8 layers of irony or being made by a 6yo thanks for this masterpiece lmao

    • @devilfrog4209
      @devilfrog4209 2 года назад +7

      "Elite hacker tool" boy what

    • @trayambakrai
      @trayambakrai 2 года назад +71

      @@devilfrog4209
      The joke 💨💨💨
      🤓

  • @AgentFortySeven47
    @AgentFortySeven47 2 года назад +413

    SSH is one of those concepts I've struggled with a bit in my IT studies. This video explained it perfectly for me. Thanks Mental Outlaw.

  • @crekkk
    @crekkk 2 года назад +590

    It would be great if you could do more of these informative style videos. I suppose the majority of your viewers are probably technically proficient so perhaps it wouldn't be worth it but I think you have an excellent way of explaining a topic without being condescending. It's nice to watch someone explain something without stopping for every tiny detail, but covering the concept in a way that people can understand and develop as a platform for their learning. Either way, great video Outlaw.

    • @TirisT1000
      @TirisT1000 2 года назад +26

      I agree! His style of presentation is informative and enjoyable. Perhaps a second channel would be good?
      I'm still new to computer science topics and am trying to get out of the 'I don't know what I don't know' phase by absorbing as much as I can, so this video was great.

    • @spaghettilastname3095
      @spaghettilastname3095 2 года назад +1

      I also like this

    • @LungCancer420
      @LungCancer420 2 года назад +4

      I started watching this channel because of the technically informative videos. Now I watch this channel for multiple kinds of informative videos. I just hope Mr. Outlaw keeps churning out videos for us to learn stuff

    • @tjdjultima
      @tjdjultima 2 года назад +2

      I work in the industry and don’t know a lot of this as it’s not immediately related to my role, so, totally agree!

  • @atpray
    @atpray 2 года назад +274

    ssh is a life safer. My use cases
    - Managing my servers.
    - ssh config file is super helpful. Instead of remembering multiple ip's and ports, I can assign it a simple name.
    - Public-private key authentication is super easy. More secure and much convenient, instead of typing password each time you ssh.
    - Port forwarding with ssh to use a vnc viewer on my local desktop. Even tho servers are not meant to have a desktop environment, sometimes it is required (I use them with docker or lxd containers)
    - Port forwarding with ssh to test/configure the website before making it public.
    - Using sshfs, to mount a server directory on local machine. Kinda works like network storage.

    • @TurkeyOW
      @TurkeyOW 2 года назад +5

      I already knew a bit abt ssh so this video was more of a fun time killer. Super cool to hear examples of its versatility because when learning new topics I have a hard time grasping just how many places you can apply them.

    • @ziemniok111
      @ziemniok111 2 года назад +5

      ssh tunneling is fucking brilliant

    • @toasty_dreamss2076
      @toasty_dreamss2076 2 года назад +1

      @@TurkeyOW same. Learning the application of a topic is a bit tough when you're starting out. It's the fun-est bit tho... applicability is key 🔑👌

    • @srpenguinbr
      @srpenguinbr 2 года назад +5

      Another use: logging into a local vm in your regular terminal

    • @-morrow
      @-morrow Год назад

      another fun thing: proxy jump through a bastion host

  • @Gbennett1425
    @Gbennett1425 2 года назад +36

    I am needing to use this with my Raspberry pi for a class project, having one of my favorite youtubers in this field explain how it works makes it even better

    • @NostraDavid2
      @NostraDavid2 2 года назад +1

      You've probably used ssh-keygen to create a private and public key file, right? I also assume you need to input your password when you log into your pi?
      Use ssh-copy-id to copy your public key to the pi. You'll probably have to change your local config, but it's sooo nice not to type your password every time! :D

    • @Gbennett1425
      @Gbennett1425 2 года назад +1

      @@NostraDavid2 thanks for the tip, I’ll definitely be sure to try that

  • @SacreligousTurkey
    @SacreligousTurkey 2 года назад +93

    Aside from the bloat free, direct, and well articulated information you present every time... That creepy Joe meme at 2:38 is why you’re my favorite person on RUclips

    • @raynerhandrian1486
      @raynerhandrian1486 2 года назад +3

      And it's a lot more cursed if you know the character in that meme

    • @mrkiky
      @mrkiky Год назад +8

      Creepy Joe sniffing that poor unencrypted packet 😥

    • @josesantana3825
      @josesantana3825 9 месяцев назад

      😅

  • @bahathir_
    @bahathir_ 2 года назад +55

    In late 1990's, network was simple. PC's were connected to 'HUB', and it was very easy to 'sniff' connections. With Slackware Linux, I used program called 'sniffit' and I able to 'see' every connections in the network. IRC was very popular, and I able to 'see' all the chats and sometime I pranked them. :)
    SSH not just replaced the rsh or rlogin, but also ftp and rcp too.
    Thank you.

  • @Kaz-qz2oq
    @Kaz-qz2oq 2 года назад +9

    I learned about SSH by jailbreaking my Apple products years ago. Thanks for spreading the love

  • @YSANROCHEOfficialYoutube
    @YSANROCHEOfficialYoutube 2 года назад +4

    You are doing great, I highly appreciate videos of content creators like you. Sending Praise and Love to you, keep going

  • @cxob2134
    @cxob2134 2 года назад +8

    use it every day, still learned something, the sign of good content!

  • @RetroDev256
    @RetroDev256 2 года назад +103

    Maybe a better idea of what padding would represent in your analogy would not to mix in decoy packages, but to use the same package size for each item you receive, so you could not theoretically infer information about the object inside by its size

    • @fischmann1746
      @fischmann1746 Год назад +2

      This.

    • @GhostkillerPlaysMC
      @GhostkillerPlaysMC 11 месяцев назад

      How does it do that? I was thinking it’d be more like putting rocks in the packages. But is this standard weight large enough so that no packet will need to be greater than it?

  • @sethbingo
    @sethbingo 2 года назад +15

    Just wanted to drop by and say your videos helped me get SEC+ certified. Thanks 👍

  • @sebastianarrieta9678
    @sebastianarrieta9678 2 года назад +44

    Thanks to SSH, SFTP exists. It's the same as FTP but through SSH. And it doesn't need the other server to run a FTP server!!!!

  • @eideticex
    @eideticex 2 года назад +9

    Another really nice use of SSH is debugging software, especially interop software where more than one programming language and runtime is used. Got a lot of mileage out of it for debugging some C# interop recently when the existing debuggers for that just weren't giving low enough level of information. Kept an SSH session open monitor the specific portions of the logs involved on another machine but could have just as well done it from the machine itself since SSH works the same locally as it does remotely.

    • @kreuner11
      @kreuner11 2 года назад +1

      Why do you need ssh for that?

    • @satibel
      @satibel 2 года назад

      @@kreuner11 basically TeamViewer for command line
      Yeah there are other options but watch or inotify over ssh works very well for this use case (monitoring logs)

    • @kreuner11
      @kreuner11 2 года назад +3

      @@satibel I mean, for local logs you can use tail -f

  • @stefanklaus6441
    @stefanklaus6441 2 года назад +1

    I would really appreciate more videos like this
    A bit calmer and more focused than usual.

  • @MeroFuruyaSankarea
    @MeroFuruyaSankarea 2 года назад +15

    this is the content corporate youtube wants!

  • @ozzy2361
    @ozzy2361 2 года назад +6

    Not only did I really enjoy this, but I also learned a lot. Started from the creation of ssh to modern ssh, all while being super concise. Thanks a lot man!

  • @midimusicforever
    @midimusicforever 2 года назад +2

    Very important tool that one just uses without stopping to appreciate what a nice thing it is!

  • @codex8797
    @codex8797 11 дней назад +1

    Pretty solid explanation bro, thank you.

  • @tedbear631
    @tedbear631 2 года назад +3

    Thanks as always for this. Love learning about this kind of thing even though I already know a lot about tech didn't know much about SSH except is was secure thanks!!!

  •  11 месяцев назад +1

    Pleasant narration. Keep up the good work. 👌🏻

  • @alwayslaidback
    @alwayslaidback 2 года назад +1

    Perfect video for me as an ongoing systems engineer. Thanks!

  • @codinginflow
    @codinginflow Год назад

    Wow, this was really well done. Concise and to the point.

  • @chaysx177
    @chaysx177 2 года назад +1

    Please post more of this content. It's within your level of expertise :)

  • @AdrX003
    @AdrX003 2 года назад

    I usually read stuff about this but i might start checking out more videos like these, look very interesting, Thanks!

  • @FirstnameLastname-xw5pb
    @FirstnameLastname-xw5pb 2 года назад

    Ay G ion dub I didnt even know what u on till I saw this video thanks dawg u da real one G keep it up and stay up.

  • @lonefloppa
    @lonefloppa 9 месяцев назад +1

    The first time I heard about ssh I remember saying: Surely I should abuse it

  • @synchro505
    @synchro505 2 года назад

    An here I thought I knew a thing or two about SSH. Nope. Learned a ton from this video. Many thanks!

  • @kebman
    @kebman 2 года назад +3

    There's a specific reason for why compression is added last due to how compression before encryption introduces some recognizable patterns, even though it might even be detrimental to the achievable level of compression. But safety first! :)

  • @xn1kkix
    @xn1kkix 2 года назад

    thank u, been dealing with some crazy stuff lately this helps

  • @teacon7
    @teacon7 2 года назад

    This vid looks nice and inoffensive, sure, but also it's useful and informative in its own right. Thanks for making it.

  • @typeer
    @typeer 2 года назад +39

    This is all false. SSH is a command what makes your computer run quieter

  • @mfThump
    @mfThump 2 года назад +15

    watch out man youtube might decide that controlling another device from your computer is encouraging hacking.

  • @CLOUD-dy9cr
    @CLOUD-dy9cr 2 года назад +5

    Just learned about SSH but very informative of the in depths, thank you mental outlaw

  •  2 года назад +2

    a good topic to follow would be to teach what are ssh tunnels and how to use them.
    they are very useful for the management of local network resources and yet most linux users i talked so far never used them.

  • @jimjam742
    @jimjam742 2 года назад +5

    0:25 ah yes, SHH
    everybody's favorite remote shell protocol

  • @shaunkerr8721
    @shaunkerr8721 Год назад +3

    The TCP/UDP water analogy was hilarious.

  • @halcyonacoustic7366
    @halcyonacoustic7366 2 года назад

    I knew a few use cases for ssh but what it is is often glossed over. Thanks for the video!

  • @lucaramponi4022
    @lucaramponi4022 2 года назад +1

    Outstanding video, great work Mental sir

  • @MC2738
    @MC2738 2 года назад +14

    I laughed so hard at 2:38.
    Well done, my friend, well done.

  • @WORMSTweaker
    @WORMSTweaker 2 года назад

    You made me discover the -X argument for SSH, thank you, this is amazing

  • @KangJangkrik
    @KangJangkrik 2 года назад

    Finally, useful video! This is better than biased rant like what Kenny usually did, tbh

  • @kd7nyq
    @kd7nyq 2 года назад

    Those photos and graphics sure take me back!

  • @KotleKettle
    @KotleKettle 2 года назад

    And again, thank you for educating us, normies, my humble king. Love you 💕

  • @afallingtree9114
    @afallingtree9114 2 года назад +10

    this is the type of information that needs to be taught in school

    • @ghosthunter0950
      @ghosthunter0950 2 года назад

      Haha you wish. They aren't even teaching standard stuff that every single person will have to know. The school system is a failure in everything but the intention behind it.

    • @JValor
      @JValor 2 года назад

      American schools don't want to mold utilitarians, they want lap dogs.

    • @afallingtree9114
      @afallingtree9114 2 года назад

      @@ghosthunter0950 absolutely, but there isn't a whole lot we can realistically do about it

    • @guzzergusher
      @guzzergusher 10 месяцев назад +1

      It already is lol

  • @joeldoxtator9804
    @joeldoxtator9804 2 года назад

    SSH is my favorite function of linux. It's the best way to manage a server rack all the way down to the router.

  • @Thomas-41234
    @Thomas-41234 2 года назад +2

    In 1997 I had a direct ethernet connection from my apartment to the university network. I used some aplication (can't remember the name) to get the X from the university unix computers to my linux computer. It was all unsecure telnet connections. We had hundreds of students with their computers sharing pics, music and whatever in their unsecure FTP connections. Damn, those were crazy times, haha.

  • @johngold5214
    @johngold5214 2 года назад

    Fantastic video! It was easy to follow and didn't' bore me at any point.

  • @purdysanchez
    @purdysanchez 11 месяцев назад

    This was a great video. You should do more of these. Maybe one about how asymmetric encryption is used to negotiate the connection and exchange the symmetric key?

  • @isbestlizard
    @isbestlizard 2 года назад +2

    You could have mentioned scp which allows file copies between hosts via ssh, and is super useful for those times you want to move files but can't be arsed setting up nfs.

    • @isbestlizard
      @isbestlizard 2 года назад +2

      Oooooh and authorized_keys versus password authentication, once you have a key you can zip between loads of hosts without ever having to type your password again :D

  • @connivingkhajiit
    @connivingkhajiit 2 года назад +20

    Good evening, Mr. Outlaw. Any chance you could do a video about port forwarding? My suddenly stopped seeding and supposedly my port is not forwarded. I'm too smooth-brained about networking to figure it out properly.

    • @derram0k
      @derram0k 2 года назад +6

      Port forwarding is done on your router and might be called something different depending on what router you have.
      There's a website that breaks it down pretty simply.

    • @whitewolf262
      @whitewolf262 2 года назад +7

      Also: on some ISP supplied routers, it's very difficult or even impossible to port forward. I ended up buying my own equipment because of it.

    • @sunglocto
      @sunglocto 2 года назад +1

      @@whitewolf262 Yeah, on my sky router you need to pay for static ips and port fotwarding

    • @tworiversfolk923
      @tworiversfolk923 2 года назад

      @@sunglocto Thats insane you would need to pay for static IP's! Next thing to happen is force /30 instead of the standard /24 for the subnet.

    • @connivingkhajiit
      @connivingkhajiit Год назад +1

      @@tworiversfolk923 in the last 10 months i took two networking classes at my university and now i know what that means!

  • @heller166
    @heller166 2 года назад +1

    the matrix background behind the packet breakdown had me rolling

  • @highmanwich5413
    @highmanwich5413 2 года назад

    Thanks for the video Mr. Outlaw! Have a good one 😃

  • @danub3926
    @danub3926 2 года назад

    Very nice explanation. As a linux ssh newbie I found your explanation very informative. I followed ya on Odysee just in case the algorithym gets ya. . .

  • @Radi0he4d1
    @Radi0he4d1 2 года назад +3

    I know I can read how X11 works on Wikipedia, but having Mental Outlaw explain it would be way cooler

  • @TheTransporter007
    @TheTransporter007 Год назад +2

    1:00 is that Omar Epps in the green jacket?!?

  • @ram9881
    @ram9881 2 года назад

    This video is outstanding and packed with knowledge, but is no one going to talk about the Nagisa cameo? MentalOutlaw trutly is a man of culture.

  • @apollomedia7210
    @apollomedia7210 2 года назад

    That TCP UDP picture was spot on. Funny lol

  • @PunisherSM
    @PunisherSM 8 месяцев назад

    Using this video a couple years later to educate myself so I can remote in to my own PC to access a local AI model I installed through terminal.

  • @timothyt.82
    @timothyt.82 2 года назад

    It's great to have you back!

  • @imbesrs
    @imbesrs 2 года назад

    Damn how do you put out so many vids. My fave channel!

  • @dk0money
    @dk0money 2 года назад

    Great explanation and illustration.

  • @joiscode3832
    @joiscode3832 2 года назад

    Thx. Its go to understand how what your doing works

  • @Icanbarelyfinishpersonagames
    @Icanbarelyfinishpersonagames 10 месяцев назад

    "back in the early 90s", proceeds to show a shot from the movie juice, love it.

  • @theITGuy-no3nt
    @theITGuy-no3nt 2 года назад

    Wow. This is the perfect SSH primer. -- a Grey Beard who would have picked you up on the tiniest mistake, but found none

  • @morsine
    @morsine 2 года назад

    I've used Linux since more than 12 years ago, however I've never read how SSH works. Thank you for making this!

  • @LinuxUser123
    @LinuxUser123 2 года назад

    I recently just installed bitvise to host an ssh server for file sharing, works great, I recommend that if you Wana host ssh on windows

  • @redringofdeathgamer
    @redringofdeathgamer 2 года назад +4

    "Sniffing it.". Chef's kiss.😁

  • @lightmorrison5404
    @lightmorrison5404 2 года назад

    please do more of these style of this videos along with your normal stuff!!

  • @encrypt3d587
    @encrypt3d587 2 года назад

    I was looking for a good explanation of the protocol yesterday, get out of my walls

  • @clerooth
    @clerooth 2 года назад

    @0:25 you spelled SSH wrong. Love your content so far

  • @Paul-oi2wz
    @Paul-oi2wz 2 года назад

    What I hoped to learn (which I can't find anywhere) is how do both parties exchange keys without outsiders listening in which will allow to however listening in on the key exchanges to decrypt everything.

  • @uknowme9078
    @uknowme9078 2 года назад +1

    3:15 this dude is correct. I be watching all my neighbors receive their packages. Wondering is that the mother load to take or some nail polish

  • @Elsudo1221
    @Elsudo1221 10 месяцев назад

    Bro explained this better than all my instructors 💀

  • @lex_darlog_fun
    @lex_darlog_fun 2 года назад +1

    Thanks a lot, and the video has (almost) prefect timing personally for me.
    I was wondering about how secure the secure shell is, and you helped me get rid of most of my worries. 👍🏻
    Though, I'm still unsure if the initial credentials can be intercepted - if an attacker sniffs packets as I perform the very first thing: establishing connection (and, later, providing my credentials).

  • @ducodarling
    @ducodarling 2 года назад

    I never know if I should expect some useful tech info, or how to cook chicken...
    Happy either way. 🖥+🔑+🖥 = ⚖

  • @barbobrien9318
    @barbobrien9318 Год назад

    Well-presented and engaging.

  • @paxdriver
    @paxdriver 2 года назад

    X11 tunnel via ssh would be awesome video

  • @bigsyrup8567
    @bigsyrup8567 2 года назад +10

    I’m basically a boomer, with only enough computer smarts to be safe. I don’t normally really care about the minutiae of computers. So why do I really like your videos explaining it?

  • @Corswain
    @Corswain 7 месяцев назад

    That image about TCP vs UDP is absolute gold hahahaha.

  • @notafbihoneypot8487
    @notafbihoneypot8487 2 года назад

    Came to learn and left with mental SSHing into our Heart's.

  • @tryptaminezen3528
    @tryptaminezen3528 2 года назад

    Minor critique is at the 0:29 mark, the animation shows SHH not SSH

  • @semioval
    @semioval 2 года назад +2

    Can i download the full series of "the sopranos"?

  • @marindedic441
    @marindedic441 Год назад

    Great video. Just wanted to say that websockets also use TCP

  • @skyrimkillereh
    @skyrimkillereh 2 года назад +2

    Hey mental outlaw, could you make a video on subnetting and subnet masks please? Working on the Comptia Network+ Certification and I just really struggle to wrap my hands on subnetting well. Thanks!

    • @rekit7351
      @rekit7351 2 года назад

      i second this. i always have to look it up for the few times i use it, and then immediately forget it 5min later.

    • @TheNickBrotherhood
      @TheNickBrotherhood 2 года назад

      An easy way to learn subnet is by using nmap and adding the /1 through /34 after the target IP address. that's how I learned

    • @rekit7351
      @rekit7351 2 года назад

      @@TheNickBrotherhood ill try that, thanks

  • @agamkohli3888
    @agamkohli3888 9 месяцев назад +1

    You forgot to mention the part where sshd login uses a corrupted version of the xz util to backdoor your system

    • @rainthevaporeon7852
      @rainthevaporeon7852 9 месяцев назад

      id be suspicious if someone calls xz utils out one year in advance

    • @narayana2419
      @narayana2419 9 месяцев назад

      So realllll I’ve been following bro for a minute too. Is kind of convenient he made this videos about ssh while the back door was active but as soon as it got found Outlaw just made a new video talking about it

    • @narayana2419
      @narayana2419 9 месяцев назад

      Behavior definitely seems mad federal to me

  • @dirtyvinyl8817
    @dirtyvinyl8817 2 года назад

    Liked, comment, but my friends would give me that annoyed face if i shared. Still. no matter how many times i study and learn about SSH, i still come back to these videos and learn it again. *mainly because i always forget*

  • @uni-tek
    @uni-tek 7 месяцев назад

    Nice presentation

  • @jonragnarsson
    @jonragnarsson 2 года назад

    SSH is amazing, especially ssh tunneling. Saves so much headache.

  • @Godmil
    @Godmil 11 месяцев назад +1

    How do the client and server know how to use the same encryption/decryption methods? Is that info sent, and what stops a man-in-the-middle getting that info then intercepting packets unencrypting them and then reencrypting them? 😕

  • @frostnetz
    @frostnetz 2 года назад +3

    0:25 it says SHH on the graphic, instead of SSH ^^

  • @zgaymercode
    @zgaymercode 6 месяцев назад +2

    funny this is in my feed with all the CVE-2024-6387 stuff

  • @incelloner4465
    @incelloner4465 2 года назад

    lol love the memes, I'm subscribing

  • @friday6014
    @friday6014 2 года назад

    Do one on the Nym network. They use sphinx packets like the lightening network, reorder the packets, use decoy traffic and adjustable timing delay to defeat timing correlation

  • @snake_eyes1937
    @snake_eyes1937 2 года назад +5

    will u do a tutorial on how to run X11 over ssh?

    • @trajectoryunown
      @trajectoryunown 2 года назад

      My only experience with SSH has been accessing the command line on my Pi.
      I want to eventually set up some cameras and connect them to MotionEyeOS or something.
      Getting a visual is going to be essential, so I'd love to see a tutorial.

  • @MilanKazarka
    @MilanKazarka 2 года назад

    Interestingly still around 2005 or so - I found several servers running Telnet with usernames/paswords in a very basic dictionary that were trying to brute-force my former server through SSH through a simple dictionary. Even back then 17 years ago I was puzzled by someone using Telnet. I guess it was the usual - someone gets into a server & tries the same from that newly owned server on your server. I do hope no-one is running Linux servers out there with Telnet exposed.

  • @es1090
    @es1090 Год назад

    Nicely put, thanks.

  • @yunghart
    @yunghart 2 года назад

    Do you have a video explaining what proxies do/are and the different types?

  • @davejoseph5615
    @davejoseph5615 2 года назад

    I didn't know how SSH works. I still don't know how SSH works. All symmetric encryption ciphers use the same key for encrypting and decrypting data, which means the sender and the receiver must both have the same key. So how does SSH allow both ends of the connection to agree on and use the same key?