Linux Security - SSH Security Essentials

Поделиться
HTML-код
  • Опубликовано: 24 янв 2025

Комментарии • 185

  • @MrGFYne1337357
    @MrGFYne1337357 4 года назад +56

    Damn, making big moves. Good stuff man.
    Happy you're still teaching and doing good. Respect.

    • @HackerSploit
      @HackerSploit  4 года назад +5

      Thank you for the support mate, I hope you are keeping well.

    • @djebabliazakaria4593
      @djebabliazakaria4593 3 года назад

      How People Get Infected With Malicious Word Document[]:
      ruclips.net/video/E-Xc_bQyG2c/видео.html

  • @AliciaSykes
    @AliciaSykes 4 года назад +20

    Top tip, skip the first 8.5 minutes, the content starts to get started at 8:30

  • @charlesalmadi9665
    @charlesalmadi9665 3 года назад +3

    I stumbled upon the video, simple and straight forward. It helped me connect dots on SSH security using cryptographic keys. Keep them coming

  • @ealtay93
    @ealtay93 4 года назад +13

    Linux Security series is going to be amazing! Thanks for your hard work. Hope there will be video about securing the docker daemon and containers

    • @HackerSploit
      @HackerSploit  4 года назад +2

      Thank you very much for your support, definitely, Docker security is a subject that interests me and I have been working on and learning containerization technology for a while now.

    • @morningstar3437
      @morningstar3437 3 года назад +1

      @@HackerSploit you Kenyan?

    • @HackerSploit
      @HackerSploit  3 года назад +1

      @@morningstar3437 Yes

  • @rycarr
    @rycarr 3 года назад +1

    I know I’m late to it but I really appreciate these videos. They answer some questions I had for years and could never find a good explanation of how to perform the task or the information is aimed at configuring for a niche need.

  • @devigopi8305
    @devigopi8305 4 года назад +3

    Your videos are aswome... so useful for my career. Thanks for making these videos. LOVE FROM INDIA

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @mainakray6452
    @mainakray6452 4 года назад +4

    thank you very much. I was finding this kind of sysadmin stuff and then I got your video. Keep making these kinds of awesome videos...:)

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @Akhan4u
    @Akhan4u 4 года назад +1

    Appreciation in words will not make justice for this work ! ❤️ Thank you HackerSploit and Linode!

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @tonyfernandes216
    @tonyfernandes216 4 года назад +2

    hey Alexis another great video, your teaching skills are simply out of this world I've learned more in your tutorials then my college and uni combined, if I have a power I would gladly give you The George Cross award

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @cryptoniccodict9566
    @cryptoniccodict9566 3 года назад +1

    Hey man just want to say thank you so much for the content that you are providing :)

  • @thanishnoor3234
    @thanishnoor3234 4 года назад +1

    Thank you for making these kinds of videos

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @MartinKamau-gs1st
    @MartinKamau-gs1st 2 года назад

    You are a genius!! Am just a beginner and all these is pretty much overwhelming to understand (The cyber world as a whole).

  • @ari178
    @ari178 Год назад

    Excellent series. Thank you

  • @KICKASS4272
    @KICKASS4272 4 года назад +2

    So glad I found this channel

  • @zurkoprekidac5721
    @zurkoprekidac5721 4 года назад +11

    About best practices:
    Never share private key with the team, because you will never be able to determine who was logged, every user should have personal account with username and private key.
    In every ssh hardening video or tutorial the only focus is on sshd_config file, but very rarely anyone talks about weak cryptographic ciphers, weak keys... For strongest hardening crypto policy should be changed (weak ciphers should be removed): /etc/crypto-policies/back-ends/openssh.config

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @barlommit859
    @barlommit859 3 года назад

    i love leaning from your channel , good work keep it up

  • @ghaffardar7565
    @ghaffardar7565 4 года назад +6

    Finely We found a great teacher on youtube

  • @silentkille4
    @silentkille4 4 года назад +1

    one of the best videos it was so helpful thanks mate

  • @HackerSploit
    @HackerSploit  4 года назад

    Timestamps:
    0:00 Introduction to the series
    2:14 Video starts
    You can register for part 2 of this series here: event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&partnerref=website&eventid=2649692&sessionid=1&key=FDD7D40926383C11B3392509222D8368®Tag=1558905&sourcepage=register

  • @mrognib311
    @mrognib311 4 года назад +1

    Thanks for doing this. Excellent!

  • @juul216
    @juul216 3 года назад

    Amazing series altough i have a lot of overlap there are still many small tips n tricks in these videos i'll definetly use!

  • @billapatigoutham6066
    @billapatigoutham6066 4 года назад +1

    Very informative 👍

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @nurai3928
    @nurai3928 3 года назад

    Happy teacher's day you're my teacher 💓
    I'm the corn you replied in your discord 💓

  • @ru31k32
    @ru31k32 4 года назад +2

    Sorry, am confused.
    Isnt the public key used to encrypt and the private used to decrypt??
    20:38

    • @DHIRAL2908
      @DHIRAL2908 4 года назад +2

      Public key can decrypt something encrypted by it's paired private key!

    • @devnullification
      @devnullification 4 года назад

      @@DHIRAL2908 Yeah, but that is actually not called encryption, but that's what digital signatures are.

    • @ru31k32
      @ru31k32 4 года назад

      @@DHIRAL2908 Thanks!! :D I found this when looking for an answer. www.tutorialspoint.com/difference-between-private-key-and-public-key
      As you said, both can encrypt and decrypt.

  • @luqmanhamdan9285
    @luqmanhamdan9285 4 года назад

    This is great stuff. Keep up the work 👍👍👍

  • @claudebernard3442
    @claudebernard3442 Год назад

    thank you for your help, i register on linode

  • @eonraider
    @eonraider 4 года назад

    There's something wrong in the explanation on public-private key authentication around the 20:10 mark. In actuality the SERVER generates and sends a hashed random string encrypted using the client's PUBLIC key. If then the client is able to decrypt such hashed data it necessarily proves possession of the corresponding private key, thus authenticating itself (because we assume that the private key has been kept private) AFTER the server receives the decrypted hash from the client and compares it with the original data it generated during the start of the process. At this point, if there is a match between the information the server sent to the client and the response received from it, the server is safe to assume that whatever party is requesting this connection is the one in possession of the private key that's mathematically related to the public key it holds as one of those listed in its authorized_keys file. That's, by the way, the reason why the public key has to be sent to the server PRIOR to a key-based authentication can take place (for it must have knowledge of the public key itself if it is to issue the challenge to the connecting party). The explanation given in the video was misleading, as far as I know.

    • @HackerSploit
      @HackerSploit  4 года назад

      Thank you for pointing this out, I will be making the corrections as soon as possible.

  • @davehans9262
    @davehans9262 4 года назад +1

    great stuff....first time here

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @nicholastoo858
    @nicholastoo858 11 месяцев назад

    Great teacher.

  • @richardkicklighter8280
    @richardkicklighter8280 4 года назад

    Outstanding video.

  • @NoONE-bk7ud
    @NoONE-bk7ud 8 месяцев назад

    this guy is underrated

  • @skolarii
    @skolarii 4 года назад +2

    At 21:08 you mention you "encrypt with private key and decrypt with public key".. Isn't it the other way around?

    • @devnullification
      @devnullification 4 года назад

      It's that way. The encryption is just called "signing", because encrypting stuff with the private key is what signing is

    • @skolarii
      @skolarii 4 года назад

      @@devnullification so anyone with the public key can decrypt the traffic?

    • @devnullification
      @devnullification 4 года назад +1

      @@skolarii No - anyone with the public key can check if the signature is correct. The traffic is encrypted with another key, which is changed each session and during longer sessions. That's a symmetric key exchanged via a key exchange mechanism (like diffie hellmann). That part is the same for password logins. The public/private key pair is just used for authentication.

    • @skolarii
      @skolarii 4 года назад +1

      @@devnullification i understand now.. thank you!

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @codeindustries6983
    @codeindustries6983 4 года назад +2

    Love you from India 😘😘

  • @mohammedsalahudheen7288
    @mohammedsalahudheen7288 4 года назад

    Your video really awesome and Helpful

  • @akashh8583
    @akashh8583 4 года назад

    Best Explanation && it helps a lot to improve linux knowledge

  • @angell.1578
    @angell.1578 4 года назад

    New subcriber here. Nice videos you do, you explain everything and that make us a very simple view, thank you.

  • @h8handles
    @h8handles 4 года назад +1

    Hackersploit at it again!

  • @chromerims
    @chromerims 2 года назад

    @HackerSploit Thank you very much for your excellent videos. Why are there two SSH keys at 18:58? Was one left over from an earlier dry run?

  • @minegamer369
    @minegamer369 4 года назад +2

    Is there a way to use ssh keys gen on linux and use them on windows(with putty)?

    • @chrissutton6235
      @chrissutton6235 4 года назад

      You can. PuTTy likes their format, but you can use puttygen to import the pem and convert to ppk. Or you can just use puttygen to generate the key pair. Puttygen has less options when generating keys, but you can do rsa 4k and other options.

  • @JohnAlanWoods
    @JohnAlanWoods 4 года назад +2

    How can you recommend RSA based cryptography over ECC, specifically over ed25519? This is certainly not how I would recommend securing SSH for enterprise.

  • @abhishekrajput9434
    @abhishekrajput9434 4 года назад +1

    Nice.👍

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @hexrays6150
    @hexrays6150 4 года назад

    Very good channel. And nice voice. Greetings from germany

  • @_labib
    @_labib 3 года назад

    Fantastic!

  • @Virlo
    @Virlo 4 года назад +1

    But if you are on outside somewhere else and you need to login quick in the server on a different pc then you can’t.. can you bring a USB with the private key on it and then have access?

    • @calvinu3601
      @calvinu3601 4 года назад

      Of course you can. Just specify the private key with option -i or copy it to ~/.ssh/ (dont use the second option on a public pc of course XD)

  • @theopbro8691
    @theopbro8691 4 года назад +1

    Amazing Work!!!!!!!

  • @asdfasdf12312jhg
    @asdfasdf12312jhg 2 месяца назад

    1st half of the video is a linode ad 2nd half (9:37) is ssh basics

  • @H4Xtorpedo
    @H4Xtorpedo 4 года назад

    Hi
    Please i want to ask a question
    Is there any way that i could know about how many devices are present near me or selected area

  • @badplayer4348
    @badplayer4348 Год назад

    Dumb question but wouldn't you add the new dev user to sudoers anyway? how else can you give them access and permissions

  • @ClaudioPallone
    @ClaudioPallone 4 года назад

    I really enjoyed the video. Thanks. How would I get Putty to work with the key now? Do I have to give the private key to the windows user? whre does the user store the key? Strange you said we have to share the private key. I though the private key should be kept in the server and only the public key should be shared.

  • @allenxd
    @allenxd 4 года назад +2

    i love you man.

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @026-johnstephen.j4
    @026-johnstephen.j4 11 месяцев назад

    How do I watch part 2 of this video, link is expired, please help

  • @perseotitan9963
    @perseotitan9963 4 года назад

    Muy buen video, gracias!!!

  • @islem1263
    @islem1263 4 года назад +3

    when you use ssh-copy-id does it store your keys in the server's dev account .ssh folder?

    • @ManSplained22
      @ManSplained22 4 года назад

      no its in your local machine

    • @johnd5736
      @johnd5736 4 года назад +4

      It copies the public key you specify and adds it to .ssh/authorized_keys for the user on the server you are copying to

  • @g-net7646
    @g-net7646 4 года назад

    Great tutorial, thank you!

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @ClaudioPallone
    @ClaudioPallone 4 года назад +1

    Hi, where can watch part 2 of this tutorial? cheers

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @game_addictions
    @game_addictions 3 года назад

    how to know other person information through hotspot connection
    It's possible or not

  • @alphaone81
    @alphaone81 4 года назад

    Disabling password authentication does permit public key logins + password configured when we generate public keys? Thanks

    • @chrissutton6235
      @chrissutton6235 4 года назад

      Im not sure i completely understand you question. If you are referring to the pw used to encrypt you priv key, that has no bearing on the ssh server config. That just encrypts your priv key locally so its not plain text. You basically decrypt the priv and store a plain text version in memory on the client, so your ssh client is still using it decrypted, while its encrypted on disk.

  • @dhakanednyanesh
    @dhakanednyanesh 4 года назад +1

    What If we lost our private key then how can I recover, because we already denied root access?

    • @devnullification
      @devnullification 4 года назад +2

      You can (and should) use multiple keypairs. You want one for each dev team member and you likely want a securely stored away one for escrow.

  • @DaPanda19
    @DaPanda19 4 года назад

    After running "ssh-copy-id" from my linux box I still had to enter my password and hoping it was something on my end i locked myself out... what did I do wrong? :/

  • @MaihymCG
    @MaihymCG 4 года назад

    I'm a little confused here, I don't think you uncommented PubKeyAuthentication and set it to "yes". Wouldnt this be required as well as a restart of the ssh service to be put into effect? Just feels like you missed a step unless you did it and I just didnt notice.

    • @zemba2744
      @zemba2744 4 года назад

      The lines that are commented out by default indicate the default value. So even though he did not uncomment PubKeyAuthentication it is still enabled (and has been from the beginning) because its default value is yes.

  • @kr4k3nn
    @kr4k3nn 4 года назад

    Does private key is specific to a computer means if i have the private key of a computer, can i login to that account from another computer?

  • @elaprendiz1504
    @elaprendiz1504 4 года назад

    Hello I try to configure the openssh server, to connect from a Windows using Plink.exe but I can't.
    Any recommendation?
    It's on HTB's Buff machine

  • @josekiki1587
    @josekiki1587 3 года назад

    It is a great course with great super deep explanations for understanding your great cyber mentor. I have a question, if I have 8Gb memory RAM in my pc how many machines can I create in my Virtualbox machine or I can only create one machine in it e.g like only kali Linux and maybe what if I want an ubuntu machine too.

  • @h8handles
    @h8handles 4 года назад

    so when you ran the ssh-copy......i only got 1 key why did you get two?
    if you have time to answer.

    • @jacobboomgaarden
      @jacobboomgaarden 3 года назад

      it appended multiple identities from his host system into the ssh server's authorized keys file because he likely had more than one identity file on his host machine. To ensure ssh-copy-id only copies over the desired identity, I think you want to use the "-i identity_file" option.

  • @pipi_delina
    @pipi_delina 4 года назад

    The URL is broken

  • @shubhamsehgal2336
    @shubhamsehgal2336 4 года назад +1

    OP voice...You can replace martin Taylor or alan smith

  • @venkatesh4318
    @venkatesh4318 3 года назад

    Bro when I am installing a script it's asking GitHub user name and password bro and I am entering that it's showing no repository found can u help me this bro

  • @sumitsingh-ys6ew
    @sumitsingh-ys6ew 4 года назад

    man, u really hit hard : )

  • @raysaul
    @raysaul 4 года назад

    Great way of explaining things!!!
    Now how will you share the rsa key securely to the dev team?

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @tonyfernandes216
    @tonyfernandes216 4 года назад +3

    your tutorial is simply awsome man. can I set up a free account for learning

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @FakedPvp
    @FakedPvp 2 года назад

    Another note is put a password on the key so a random that has access to the system. use the key to get in to the server

  • @PetritK10
    @PetritK10 4 года назад

    Thank you

  • @TechiewithMoon
    @TechiewithMoon 4 года назад

    This is Good stuff

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @TheVinnythestick
    @TheVinnythestick 3 года назад

    Is this a ssh tutorial or an advertisement for linode?

  • @pedropereira5609
    @pedropereira5609 4 года назад +2

    Hello there, you presented us with a great explanatory video, but I believe you made a mistake. In SSH the public key is the one that encrypts not the private.

    • @HackerSploit
      @HackerSploit  4 года назад

      Thank you for pointing this out, i will make the necessary correction.

    • @mauriceedwards4298
      @mauriceedwards4298 4 года назад

      Great catch! Digital signatures are run backwards though - the sender's private key is used to sign (by encrypting a hash of the original message), and his public key is used both to verify that the sender is exactly as advertised and that the message has not been altered after it was sent.

  • @shytechinfo
    @shytechinfo 4 года назад

    Sir, are you also getting strikes like all other infosec youtuber getting ???? I'm a bit worried what if this channel terminated

  • @kyawboss1313
    @kyawboss1313 4 года назад

    Thank U bro

  • @zwyklyuser44
    @zwyklyuser44 4 года назад

    Thanks !!!!!!

  • @hanko1
    @hanko1 4 года назад

    Bro Please can you make just short video onVishing and Smishing

  • @-argih
    @-argih 4 года назад +1

    Windows 10 has the openSSH client by default since last year

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @technicalgamer7668
    @technicalgamer7668 3 года назад

    Sim card scan tuturoial pls

  • @calciumdd7696
    @calciumdd7696 4 года назад

    nice

  • @naveensaradhi6923
    @naveensaradhi6923 4 года назад

    Bro please do hackerone or bugcrowd bugs hunting videos

  • @sat_stacker
    @sat_stacker 4 года назад +1

    Hi I love your videos. I am wondering how to prevent open ssh from reporting so much information.
    Example
    curl ip:22
    SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2
    curl: (56) Recv failure: Connection was reset
    Its exposing my operating system, and ssh versions.
    thank you

    • @jacobboomgaarden
      @jacobboomgaarden 3 года назад

      serverfault.com/questions/216801/prevent-ssh-from-advertising-its-version-number/767445 ... you can probably remove the distro OS information using some values in the /etc/ssh/sshd_config file, but the SSH version info is likely compiled into the sshd binary itself.

  • @abdulnasmi
    @abdulnasmi 4 года назад +1

    ❤️😊

  • @abdullahihussein8860
    @abdullahihussein8860 4 года назад

    Good

  • @utkarshgupta6258
    @utkarshgupta6258 4 года назад

    ❤🇮🇳🇮🇳 from Indian

  • @sundar3357
    @sundar3357 4 года назад +1

    Now only I am seeing the man behind the voice

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @magic2267
    @magic2267 4 года назад +3

  • @Pixailz
    @Pixailz 4 года назад

    Hello hackersploit, I would like to know why when I set up the port to the default I have a lot of people trying to brutforce me. I have setup fail2ban but when I setup the port to an other they stop brute forcing me. I would like to know if every ip are continually being scanned or something because if someone don't look to the log and have setup default port they may have trouble
    Thanks for replying, you are the best in my heart

  • @muhammadaltaf4796
    @muhammadaltaf4796 3 года назад

    Give me an alternative solution thnx

  • @naveensaradhi6923
    @naveensaradhi6923 4 года назад +1

    Bro please can u reply

  • @Insomniac_Insights
    @Insomniac_Insights 4 года назад

    How to create browser Extension?

  • @legendigl8291
    @legendigl8291 4 года назад

    Bro I have one tought

  • @alizainkazmi4372
    @alizainkazmi4372 4 года назад +1

    Bro do u have an insta or facebook id?......i want to talk to u there

    • @gosukiehl
      @gosukiehl 4 года назад +1

      hackers don't use crap social media, bro

    • @rezzar3328
      @rezzar3328 4 года назад

      @@gosukiehl that is a retarded logic

    • @deus5215
      @deus5215 4 года назад

      @@rezzar3328 It's true, though

    • @rezzar3328
      @rezzar3328 4 года назад

      @@deus5215 did you watch some mr robot and come up with this bs? RUclips is considered social media so he already has one of them.

    • @gosukiehl
      @gosukiehl 4 года назад +1

      @@rezzar3328 If you dig deeply into youtube you will realize it's the dark web :)

  • @ankylosis751
    @ankylosis751 4 года назад +1

    whonix?

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @player-te8tf
    @player-te8tf 4 года назад +1

    Alexis 🥺🥺

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

  • @XXxdarkhunterx
    @XXxdarkhunterx 4 года назад

    Not to be rude but most of the time i try to watch your tutorials i have to skip at least 8 minutes of intro. otherwise thanks for your tutorials :)

  • @valinoce
    @valinoce 8 месяцев назад

    though SUSE YAST SUPPORTS GUI for configurations, one should still know the config files maniputations in texts, I suppose!!! hahaha!!!

  • @guyallo3803
    @guyallo3803 4 года назад

    hello sir , pls add english subtitles in ALL your videos .

    • @vivekpal728
      @vivekpal728 4 года назад

      ruclips.net/video/CpPYbCkNm4g/видео.html

    • @kithenry
      @kithenry 3 года назад

      Tap cc in the top right corner bruh...
      This guy is as eloquent as f*** so...