SlideShare ist ein Scribd-Unternehmen logo
1 von 53
SSH Secure Shell From:  http://en.wikipedia.org/wiki/Ssh
SSH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSH ,[object Object],[object Object],[object Object],[object Object]
SSH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History
History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uses of SSH
SSH is most commonly used:
Uses of SSH: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uses of SSH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uses of SSH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uses of SSH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Uses of SSH ,[object Object],[object Object]
Uses of SSH ,[object Object],[object Object],[object Object]
SSH architecture
SSH architecture ,[object Object],[object Object],[object Object],[object Object],[object Object]
SSH architecture – Transport Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSH architecture –  User Authentication Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSH architecture –  User Authentication Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
SSH architecture –  User Authentication Layer ,[object Object],[object Object],[object Object],[object Object]
SSH architecture –  User Authentication Layer ,[object Object],[object Object],[object Object],[object Object]
SSH architecture –  User Authentication Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSH architecture –  User Authentication Layer ,[object Object],[object Object],[object Object]
SSH architecture –  Connection Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
SSH architecture –  Connection Layer ,[object Object],[object Object],[object Object],[object Object]
SSH architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security cautions
Security cautions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security cautions ,[object Object],[object Object],[object Object]
Security cautions ,[object Object],[object Object],[object Object],[object Object]
How SSH uses public-key cryptography
How SSH uses public-key cryptography  (with analogy) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCP http://en.wikipedia.org/wiki/Secure_copy
SCP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCP protocol ,[object Object],[object Object],[object Object],[object Object],[object Object]
SCP protocol ,[object Object],[object Object],[object Object],[object Object],[object Object]
SCP protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCP protocol ,[object Object],[object Object],[object Object],[object Object]
SCP protocol ,[object Object],[object Object]
SCP program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCP program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCP program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SFTP http://en.wikipedia.org/wiki/SSH_file_transfer_protocol
SFTP ,[object Object],[object Object],[object Object],[object Object]
Capabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Capabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Capabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Capabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standardization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SFTP client ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
Sourav Roy
 

Was ist angesagt? (19)

Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
Ssh
SshSsh
Ssh
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Intro to SSH
Intro to SSHIntro to SSH
Intro to SSH
 
Share File easily between computers using sftp
Share File easily between computers using sftpShare File easily between computers using sftp
Share File easily between computers using sftp
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
OpenSSH tricks
OpenSSH tricksOpenSSH tricks
OpenSSH tricks
 
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh configFLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
 
Introduction to SSH & PGP
Introduction to SSH & PGPIntroduction to SSH & PGP
Introduction to SSH & PGP
 
SSH
SSHSSH
SSH
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
 
Meeting 5.2 : ssh
Meeting 5.2 : sshMeeting 5.2 : ssh
Meeting 5.2 : ssh
 
SSH Tunneling Recipes
SSH Tunneling RecipesSSH Tunneling Recipes
SSH Tunneling Recipes
 
Network telnet ssh
Network telnet sshNetwork telnet ssh
Network telnet ssh
 
Using Secure Shell on Linux: What Everyone Should Know
Using Secure Shell on Linux: What Everyone Should KnowUsing Secure Shell on Linux: What Everyone Should Know
Using Secure Shell on Linux: What Everyone Should Know
 

Andere mochten auch

Visul - Grupa Pumelor
Visul - Grupa PumelorVisul - Grupa Pumelor
Visul - Grupa Pumelor
Radu Capan
 
Serviços google para E-commerce
Serviços google para E-commerceServiços google para E-commerce
Serviços google para E-commerce
Mônica Oliveira
 
6 February Daily market report
6 February Daily market report 6 February Daily market report
6 February Daily market report
QNB Group
 
Fachgerechte fenstermontage greente q_pl_small 11
Fachgerechte fenstermontage greente q_pl_small 11Fachgerechte fenstermontage greente q_pl_small 11
Fachgerechte fenstermontage greente q_pl_small 11
infookno
 
Qtravel
QtravelQtravel
Qtravel
3camp
 
Historia kolędy „cicha noc (sylwia pruś, patrycja pruś)
Historia kolędy „cicha noc   (sylwia pruś, patrycja pruś)Historia kolędy „cicha noc   (sylwia pruś, patrycja pruś)
Historia kolędy „cicha noc (sylwia pruś, patrycja pruś)
G_P_
 
PR in Nonprofits Feb 2014
PR in Nonprofits Feb 2014PR in Nonprofits Feb 2014
PR in Nonprofits Feb 2014
SaraMcC120
 
Gazetka osaa 05_06_2014
Gazetka osaa 05_06_2014Gazetka osaa 05_06_2014
Gazetka osaa 05_06_2014
Jacek Hanysz
 
niebieska odznaka wskazowki dla ucznia z doswiadczonej szkoly
niebieska odznaka wskazowki dla ucznia z doswiadczonej szkolyniebieska odznaka wskazowki dla ucznia z doswiadczonej szkoly
niebieska odznaka wskazowki dla ucznia z doswiadczonej szkoly
blogi2zero
 

Andere mochten auch (20)

Audyt toszek 018i030
Audyt toszek 018i030Audyt toszek 018i030
Audyt toszek 018i030
 
Mit Social Media bewegen
Mit Social Media bewegenMit Social Media bewegen
Mit Social Media bewegen
 
Z życia Publicznego Gimnazjum w Oleśnicy
Z życia Publicznego Gimnazjum w OleśnicyZ życia Publicznego Gimnazjum w Oleśnicy
Z życia Publicznego Gimnazjum w Oleśnicy
 
Sociala medier & rekrytering
Sociala medier & rekryteringSociala medier & rekrytering
Sociala medier & rekrytering
 
Visul - Grupa Pumelor
Visul - Grupa PumelorVisul - Grupa Pumelor
Visul - Grupa Pumelor
 
Serviços google para E-commerce
Serviços google para E-commerceServiços google para E-commerce
Serviços google para E-commerce
 
6 February Daily market report
6 February Daily market report 6 February Daily market report
6 February Daily market report
 
01
0101
01
 
Dzieje ziemi cz. 2
Dzieje ziemi cz. 2Dzieje ziemi cz. 2
Dzieje ziemi cz. 2
 
Podróż po europie
Podróż po europiePodróż po europie
Podróż po europie
 
3
33
3
 
Fachgerechte fenstermontage greente q_pl_small 11
Fachgerechte fenstermontage greente q_pl_small 11Fachgerechte fenstermontage greente q_pl_small 11
Fachgerechte fenstermontage greente q_pl_small 11
 
Qtravel
QtravelQtravel
Qtravel
 
Hialuronan como Regulador inmune
Hialuronan como  Regulador inmuneHialuronan como  Regulador inmune
Hialuronan como Regulador inmune
 
Historia kolędy „cicha noc (sylwia pruś, patrycja pruś)
Historia kolędy „cicha noc   (sylwia pruś, patrycja pruś)Historia kolędy „cicha noc   (sylwia pruś, patrycja pruś)
Historia kolędy „cicha noc (sylwia pruś, patrycja pruś)
 
PR in Nonprofits Feb 2014
PR in Nonprofits Feb 2014PR in Nonprofits Feb 2014
PR in Nonprofits Feb 2014
 
Gazetka osaa 05_06_2014
Gazetka osaa 05_06_2014Gazetka osaa 05_06_2014
Gazetka osaa 05_06_2014
 
Mapologia
MapologiaMapologia
Mapologia
 
Kronika koła doświadczeń laboratoryjnych z fizyki
Kronika koła doświadczeń laboratoryjnych z fizykiKronika koła doświadczeń laboratoryjnych z fizyki
Kronika koła doświadczeń laboratoryjnych z fizyki
 
niebieska odznaka wskazowki dla ucznia z doswiadczonej szkoly
niebieska odznaka wskazowki dla ucznia z doswiadczonej szkolyniebieska odznaka wskazowki dla ucznia z doswiadczonej szkoly
niebieska odznaka wskazowki dla ucznia z doswiadczonej szkoly
 

Ähnlich wie Ssh

Unit 13 network client
Unit 13 network clientUnit 13 network client
Unit 13 network client
root_fibo
 
SSH for pen-testers
SSH for pen-testersSSH for pen-testers
SSH for pen-testers
E D Williams
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
Sourav Roy
 

Ähnlich wie Ssh (20)

Remote1
Remote1Remote1
Remote1
 
Unit 13 network client
Unit 13 network clientUnit 13 network client
Unit 13 network client
 
OpenSSH: keep your secrets safe
OpenSSH: keep your secrets safeOpenSSH: keep your secrets safe
OpenSSH: keep your secrets safe
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
 
0696-ssh-the-secure-shell.pdf
0696-ssh-the-secure-shell.pdf0696-ssh-the-secure-shell.pdf
0696-ssh-the-secure-shell.pdf
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
SSH.pdf
SSH.pdfSSH.pdf
SSH.pdf
 
Team 5 presentation
Team 5 presentationTeam 5 presentation
Team 5 presentation
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Discuss what is SSH and the advantages and disadvantages of using it.pdf
Discuss what is SSH and the advantages and disadvantages of using it.pdfDiscuss what is SSH and the advantages and disadvantages of using it.pdf
Discuss what is SSH and the advantages and disadvantages of using it.pdf
 
SSH for pen-testers
SSH for pen-testersSSH for pen-testers
SSH for pen-testers
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
 
SSH Tunneling
SSH TunnelingSSH Tunneling
SSH Tunneling
 
MOE Ubuntu Desktop training
MOE Ubuntu Desktop trainingMOE Ubuntu Desktop training
MOE Ubuntu Desktop training
 
6 networking
6 networking6 networking
6 networking
 
tutorial-ssh.pdf
tutorial-ssh.pdftutorial-ssh.pdf
tutorial-ssh.pdf
 
Linux Servers.pptx
Linux Servers.pptxLinux Servers.pptx
Linux Servers.pptx
 
Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 

Mehr von gh02

Apache.http ftp-smtp
Apache.http ftp-smtpApache.http ftp-smtp
Apache.http ftp-smtp
gh02
 
Apache.d4 admin web
Apache.d4 admin webApache.d4 admin web
Apache.d4 admin web
gh02
 
Seguridad vo ip
Seguridad vo ipSeguridad vo ip
Seguridad vo ip
gh02
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
gh02
 
Nmap.potosim
Nmap.potosimNmap.potosim
Nmap.potosim
gh02
 
Intrusion detectionsystems
Intrusion detectionsystemsIntrusion detectionsystems
Intrusion detectionsystems
gh02
 
Wireshark.ethereal
Wireshark.etherealWireshark.ethereal
Wireshark.ethereal
gh02
 
Sshmarta
SshmartaSshmarta
Sshmarta
gh02
 

Mehr von gh02 (11)

Power gui 3.5_userguide. Powershell for windows
Power gui 3.5_userguide. Powershell for windowsPower gui 3.5_userguide. Powershell for windows
Power gui 3.5_userguide. Powershell for windows
 
Apache.http ftp-smtp
Apache.http ftp-smtpApache.http ftp-smtp
Apache.http ftp-smtp
 
Apache.d4 admin web
Apache.d4 admin webApache.d4 admin web
Apache.d4 admin web
 
Seguridad vo ip
Seguridad vo ipSeguridad vo ip
Seguridad vo ip
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Nmap.potosim
Nmap.potosimNmap.potosim
Nmap.potosim
 
Intrusion detectionsystems
Intrusion detectionsystemsIntrusion detectionsystems
Intrusion detectionsystems
 
Wireshark.ethereal
Wireshark.etherealWireshark.ethereal
Wireshark.ethereal
 
IDS Network security - Bouvry
IDS Network security - BouvryIDS Network security - Bouvry
IDS Network security - Bouvry
 
Sshmarta
SshmartaSshmarta
Sshmarta
 
Resumen iptables- 10 comandos mas usados de iptables
Resumen iptables- 10 comandos mas usados de iptablesResumen iptables- 10 comandos mas usados de iptables
Resumen iptables- 10 comandos mas usados de iptables
 

Ssh