Secure Shell
Secure Shell
INTRODUCTION
What is SSH ?
01
HISTORY
Creator of SSH 02
03
LAYERS OF SSH
PROTOCOL
Transport layre protocol,
TABLE OF
User Authentication protocol &
Connection Protocol CONTENTS
04 ATTACKS ON SSH
Type of attacks possible
in ssh
SYSTEM / USER
05 CONFIGURATION FILES
Config files with folders
01
INTRODUCTION
INTRODUCTION
TRANSPORT
LAYER
AUTHENTICATION CONNECTION
LAYER LAYER
LAYERING OF SSH 03
PROTOCOLS
Server tells client which methods can be used, client picks the
most convenient method
Man-in-the-middle:
● Very easy if the client does not have the server’s public key prior to
connecting.
● Attacker masquerades between the client and server
Denial of Service
Covert Channels
05
SYSTEM CONFIGURATION FILES
(OpenSSH)
/etc/ssh/
~/.ssh/
$ ssh-keygen -t rsa
$ ssh <remote-host>
SamiAbdul 106_Sam 106_Sam
THANKS
Does anyone have any questions?