Suche senden
Hochladen
Formation ssh
âą
1 gefÀllt mir
âą
215 views
Nicolas Ledez
Folgen
Pour tout savoir sur SSH
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 34
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Configuring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IO
HoĂ ng HáșŁi Nguyá» n
Â
SSH
SSH
Zach Dennis
Â
SSH - Secure Shell
SSH - Secure Shell
Peter R. Egli
Â
Secure SHell
Secure SHell
ĂaÄrı Ăakır
Â
Ssh
Ssh
Raghu nath
Â
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform Enviornment
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform Enviornment
Nagios
Â
Switcheo Network - Advanced NEO Smart Contracts
Switcheo Network - Advanced NEO Smart Contracts
Switcheo
Â
OpenSMTPD: we deliver !!
OpenSMTPD: we deliver !!
Giovanni Bechis
Â
Empfohlen
Configuring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IO
HoĂ ng HáșŁi Nguyá» n
Â
SSH
SSH
Zach Dennis
Â
SSH - Secure Shell
SSH - Secure Shell
Peter R. Egli
Â
Secure SHell
Secure SHell
ĂaÄrı Ăakır
Â
Ssh
Ssh
Raghu nath
Â
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform Enviornment
Nagios Conference 2013 - Leland Lammert - Nagios in a Multi-Platform Enviornment
Nagios
Â
Switcheo Network - Advanced NEO Smart Contracts
Switcheo Network - Advanced NEO Smart Contracts
Switcheo
Â
OpenSMTPD: we deliver !!
OpenSMTPD: we deliver !!
Giovanni Bechis
Â
Vpn site to site 2 asa qua gpon ftth thá»±c táșż
Vpn site to site 2 asa qua gpon ftth thá»±c táșż
laonap166
Â
Chromium Sandbox on Linux (BlackHoodie 2018)
Chromium Sandbox on Linux (BlackHoodie 2018)
Patricia Aas
Â
Secure shell protocol
Secure shell protocol
Baspally Sai Anirudh
Â
SSH: Seguranca no Acesso Remoto
SSH: Seguranca no Acesso Remoto
Tiago Cruz
Â
Secure shell
Secure shell
Arjun Aj
Â
Practical non blocking microservices in java 8
Practical non blocking microservices in java 8
Michal Balinski
Â
Codetainer: a Docker-based browser code 'sandbox'
Codetainer: a Docker-based browser code 'sandbox'
Jen Andre
Â
20141106 asfws unicode_hacks
20141106 asfws unicode_hacks
Cyber Security Alliance
Â
Crypto With OpenSSL
Crypto With OpenSSL
Zhi Guan
Â
Tatu: ssh as a service
Tatu: ssh as a service
Pino deCandia
Â
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
Â
Ost ssl lec
Ost ssl lec
Kaustubh Joshi
Â
Da APK al Golden Ticket
Da APK al Golden Ticket
Giuseppe Trotta
Â
From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13
Jaime SĂĄnchez
Â
Ssh (The Secure Shell)
Ssh (The Secure Shell)
Mehedi Farazi
Â
Secure shell(ssh) AND telnet AND CONSOLE
Secure shell(ssh) AND telnet AND CONSOLE
AmiraMohamedGalal
Â
Race car security system
Race car security system
cabreraracing
Â
Alimentos xiris rizo
Alimentos xiris rizo
Xiris Rizo
Â
Desensamblando y ensamblando la pc
Desensamblando y ensamblando la pc
DainerCruz
Â
ÎłÎșÎżÏ ÎÏÎœÎčÎșα
ÎłÎșÎżÏ ÎÏÎœÎčÎșα
prasino
Â
Flat Classroom Conference Go virtual 2013 slides
Flat Classroom Conference Go virtual 2013 slides
Flat Classrooms
Â
Calculating ROI on Blogging
Calculating ROI on Blogging
Compendium
Â
Weitere Àhnliche Inhalte
Was ist angesagt?
Vpn site to site 2 asa qua gpon ftth thá»±c táșż
Vpn site to site 2 asa qua gpon ftth thá»±c táșż
laonap166
Â
Chromium Sandbox on Linux (BlackHoodie 2018)
Chromium Sandbox on Linux (BlackHoodie 2018)
Patricia Aas
Â
Secure shell protocol
Secure shell protocol
Baspally Sai Anirudh
Â
SSH: Seguranca no Acesso Remoto
SSH: Seguranca no Acesso Remoto
Tiago Cruz
Â
Secure shell
Secure shell
Arjun Aj
Â
Practical non blocking microservices in java 8
Practical non blocking microservices in java 8
Michal Balinski
Â
Codetainer: a Docker-based browser code 'sandbox'
Codetainer: a Docker-based browser code 'sandbox'
Jen Andre
Â
20141106 asfws unicode_hacks
20141106 asfws unicode_hacks
Cyber Security Alliance
Â
Crypto With OpenSSL
Crypto With OpenSSL
Zhi Guan
Â
Tatu: ssh as a service
Tatu: ssh as a service
Pino deCandia
Â
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
Â
Ost ssl lec
Ost ssl lec
Kaustubh Joshi
Â
Da APK al Golden Ticket
Da APK al Golden Ticket
Giuseppe Trotta
Â
From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13
Jaime SĂĄnchez
Â
Ssh (The Secure Shell)
Ssh (The Secure Shell)
Mehedi Farazi
Â
Secure shell(ssh) AND telnet AND CONSOLE
Secure shell(ssh) AND telnet AND CONSOLE
AmiraMohamedGalal
Â
Was ist angesagt?
(16)
Vpn site to site 2 asa qua gpon ftth thá»±c táșż
Vpn site to site 2 asa qua gpon ftth thá»±c táșż
Â
Chromium Sandbox on Linux (BlackHoodie 2018)
Chromium Sandbox on Linux (BlackHoodie 2018)
Â
Secure shell protocol
Secure shell protocol
Â
SSH: Seguranca no Acesso Remoto
SSH: Seguranca no Acesso Remoto
Â
Secure shell
Secure shell
Â
Practical non blocking microservices in java 8
Practical non blocking microservices in java 8
Â
Codetainer: a Docker-based browser code 'sandbox'
Codetainer: a Docker-based browser code 'sandbox'
Â
20141106 asfws unicode_hacks
20141106 asfws unicode_hacks
Â
Crypto With OpenSSL
Crypto With OpenSSL
Â
Tatu: ssh as a service
Tatu: ssh as a service
Â
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Â
Ost ssl lec
Ost ssl lec
Â
Da APK al Golden Ticket
Da APK al Golden Ticket
Â
From Kernel Space to User Heaven #NDH2k13
From Kernel Space to User Heaven #NDH2k13
Â
Ssh (The Secure Shell)
Ssh (The Secure Shell)
Â
Secure shell(ssh) AND telnet AND CONSOLE
Secure shell(ssh) AND telnet AND CONSOLE
Â
Andere mochten auch
Race car security system
Race car security system
cabreraracing
Â
Alimentos xiris rizo
Alimentos xiris rizo
Xiris Rizo
Â
Desensamblando y ensamblando la pc
Desensamblando y ensamblando la pc
DainerCruz
Â
ÎłÎșÎżÏ ÎÏÎœÎčÎșα
ÎłÎșÎżÏ ÎÏÎœÎčÎșα
prasino
Â
Flat Classroom Conference Go virtual 2013 slides
Flat Classroom Conference Go virtual 2013 slides
Flat Classrooms
Â
Calculating ROI on Blogging
Calculating ROI on Blogging
Compendium
Â
1.5 infinite geometric series
1.5 infinite geometric series
Gary Ball
Â
Domino must gather information
Domino must gather information
Chris Sparshott
Â
Andere mochten auch
(8)
Race car security system
Race car security system
Â
Alimentos xiris rizo
Alimentos xiris rizo
Â
Desensamblando y ensamblando la pc
Desensamblando y ensamblando la pc
Â
ÎłÎșÎżÏ ÎÏÎœÎčÎșα
ÎłÎșÎżÏ ÎÏÎœÎčÎșα
Â
Flat Classroom Conference Go virtual 2013 slides
Flat Classroom Conference Go virtual 2013 slides
Â
Calculating ROI on Blogging
Calculating ROI on Blogging
Â
1.5 infinite geometric series
1.5 infinite geometric series
Â
Domino must gather information
Domino must gather information
Â
Ăhnlich wie Formation ssh
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Akeyless
Â
Intro to SSH
Intro to SSH
JP Bourget
Â
tutorial-ssh.pdf
tutorial-ssh.pdf
NigussMehari4
Â
Ssh cookbook v2
Ssh cookbook v2
Jean-Marie Renouard
Â
Ssh cookbook
Ssh cookbook
Jean-Marie Renouard
Â
Security and dev ops for high velocity organizations
Security and dev ops for high velocity organizations
Chef
Â
Django cryptography
Django cryptography
Erik LaBianca
Â
OpenSSH: keep your secrets safe
OpenSSH: keep your secrets safe
Giovanni Bechis
Â
SSL/TLS for Mortals (JAX DE 2018)
SSL/TLS for Mortals (JAX DE 2018)
Maarten Mulders
Â
SSH for pen-testers
SSH for pen-testers
E D Williams
Â
SSL/TLS for Mortals (Devoxx FR 2018)
SSL/TLS for Mortals (Devoxx FR 2018)
Maarten Mulders
Â
Ssh that wonderful thing
Ssh that wonderful thing
Marc Cluet
Â
InSpec Keynote at ChefConf
InSpec Keynote at ChefConf
Christoph Hartmann
Â
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
Maarten Mulders
Â
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh
Tiago Henriques
Â
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh
morisson
Â
2016 - Compliance as Code - InSpec
2016 - Compliance as Code - InSpec
devopsdaysaustin
Â
Compliance as Code
Compliance as Code
Matt Ray
Â
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
Jan Löffler
Â
dotCloud and go
dotCloud and go
Flavio Poletti
Â
Ăhnlich wie Formation ssh
(20)
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
Â
Intro to SSH
Intro to SSH
Â
tutorial-ssh.pdf
tutorial-ssh.pdf
Â
Ssh cookbook v2
Ssh cookbook v2
Â
Ssh cookbook
Ssh cookbook
Â
Security and dev ops for high velocity organizations
Security and dev ops for high velocity organizations
Â
Django cryptography
Django cryptography
Â
OpenSSH: keep your secrets safe
OpenSSH: keep your secrets safe
Â
SSL/TLS for Mortals (JAX DE 2018)
SSL/TLS for Mortals (JAX DE 2018)
Â
SSH for pen-testers
SSH for pen-testers
Â
SSL/TLS for Mortals (Devoxx FR 2018)
SSL/TLS for Mortals (Devoxx FR 2018)
Â
Ssh that wonderful thing
Ssh that wonderful thing
Â
InSpec Keynote at ChefConf
InSpec Keynote at ChefConf
Â
SSL/TLS for Mortals (Voxxed Days Luxembourg)
SSL/TLS for Mortals (Voxxed Days Luxembourg)
Â
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh
Â
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh
Â
2016 - Compliance as Code - InSpec
2016 - Compliance as Code - InSpec
Â
Compliance as Code
Compliance as Code
Â
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
Â
dotCloud and go
dotCloud and go
Â
KĂŒrzlich hochgeladen
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Â
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Â
đŹ The future of MySQL is Postgres đ
đŹ The future of MySQL is Postgres đ
RTylerCroy
Â
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Â
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Â
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Â
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Â
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Â
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Â
Finology Group â Insurtech Innovation Award 2024
Finology Group â Insurtech Innovation Award 2024
The Digital Insurer
Â
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Â
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Â
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Â
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Â
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Â
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Â
Scaling API-first â The story of a global engineering organization
Scaling API-first â The story of a global engineering organization
Radu Cotescu
Â
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Â
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Â
KĂŒrzlich hochgeladen
(20)
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Â
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Â
đŹ The future of MySQL is Postgres đ
đŹ The future of MySQL is Postgres đ
Â
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Â
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Â
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Â
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Â
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Â
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Â
Finology Group â Insurtech Innovation Award 2024
Finology Group â Insurtech Innovation Award 2024
Â
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Â
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Â
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Â
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Â
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Â
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Â
Scaling API-first â The story of a global engineering organization
Scaling API-first â The story of a global engineering organization
Â
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Â
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Â
Formation ssh
1.
Introduction AuthentiïŹcation
Tunnel Divers Secure SHell Nicolas Ledez 15 septembre 2008 Nicolas Ledez Secure SHell
2.
Introduction
AuthentiïŹcation Tunnel Divers Plan 1 Introduction 2 AuthentiïŹcation 3 Tunnel 4 Divers Nicolas Ledez Secure SHell
3.
Introduction
AuthentiïŹcation Historique et fonctionnalitĂ©s Tunnel ClĂ©/chiffrement symĂ©trique et asymĂ©trique Divers Historique 1995 par Tatu Ylönen (Helsinki Finland) Remplacement de Telnet et les r* Nicolas Ledez Secure SHell
4.
Introduction
AuthentiïŹcation Historique et fonctionnalitĂ©s Tunnel ClĂ©/chiffrement symĂ©trique et asymĂ©trique Divers FonctionnalitĂ©s 1/2 AuthentiïŹcation Chiffrement IntĂ©gritĂ© Nicolas Ledez Secure SHell
5.
Introduction
AuthentiïŹcation Historique et fonctionnalitĂ©s Tunnel ClĂ©/chiffrement symĂ©trique et asymĂ©trique Divers FonctionnalitĂ©s 2/2 Login distant Transfert de ïŹchier ExĂ©cution de commande distante ClĂ©s et agents Redirection de ports VPN Nicolas Ledez Secure SHell
6.
Clé/chiffrement symétrique
7.
Clé/chiffrement asymétrique
8.
Chiffrement dans ssh
9.
Introduction
Password AuthentiïŹcation ClĂ©s Tunnel SSH-Agent Divers Agent forwarding Password ssh AhostB root@AhostBâs password: Nicolas Ledez Secure SHell
10.
Introduction
Password AuthentiïŹcation ClĂ©s Tunnel SSH-Agent Divers Agent forwarding ClĂ©s ssh -i ~/.ssh/id_dsa_who AhostB Enter passphrase for key â~/.ssh/id_dsa_whoâ: AhostB # cat .ssh/authorized_keys ssh-dss AAAAB3NzaC1kc3MAAACBAKDWEj3QEEvNYADeGTOPXuj [...] kZQlsoVSbNM5ocYUGFE3aWWWw== Un commentaire complet sur l AhostB # ls -ld ~/ ~/.ssh/ ~/.ssh/authorized_keys drwx------ 5 root root 512 Jul 19 16:38 ~/ drwxr-xr-x 2 root root 512 Jul 3 11:45 ~/.ssh/ -rw-r--r-- 1 root other 4202 Jul 3 10:05 ~/.ssh/authori Nicolas Ledez Secure SHell
11.
Introduction
Password AuthentiïŹcation ClĂ©s Tunnel SSH-Agent Divers Agent forwarding SSH-Agent 1/2 Nicolas Ledez Secure SHell
12.
Introduction
Password AuthentiïŹcation ClĂ©s Tunnel SSH-Agent Divers Agent forwarding SSH-Agent 2/2 admin@station:~$ ssh-agent export SSH_AUTH_SOCK=/tmp/ssh-EFGVug1775/agent.1775; export SSH_AGENT_PID=1776; echo Agent pid 1776; admin@station:~$ ssh-add -l The agent has no identities. admin@station:~$ ssh-add ~/.ssh/id_dsa_who Enter passphrase for ~/.ssh/id_dsa_who: Identity added: ~/.ssh/id_dsa_who (~/.ssh/id_dsa_who) admin@station:~$ ssh-add -l 1024 06:b3:0e:fe:bc:97:7e:37:b7:a1:7d:e0:7f:0f:3b:7c ~/.ssh/id_dsa_who (DSA) Nicolas Ledez Secure SHell
13.
Introduction
Password AuthentiïŹcation ClĂ©s Tunnel SSH-Agent Divers Agent forwarding Agent forwarding 1/2 Nicolas Ledez Secure SHell
14.
Introduction
Password AuthentiïŹcation ClĂ©s Tunnel SSH-Agent Divers Agent forwarding Agent forwarding 2/2 AhostB # ssh-add -l 1024 40:33:2e:2a:71:2a:9b:a8:d1:4c:a4:4e:13:a5:b4:b1 /home/admin/.ssh/station/idd (DSA) 1024 06:b3:0e:fe:bc:97:7e:37:b7:a1:7d:e0:7f:0f:3b:7c /home/admin/.ssh/id_dsa_who (DSA) Nicolas Ledez Secure SHell
15.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 Tunnel 1/2 Nicolas Ledez Secure SHell
16.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 Tunnel 2/2 Nicolas Ledez Secure SHell
17.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 Local 1/4 Nicolas Ledez Secure SHell
18.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 Local 2/4 Nicolas Ledez Secure SHell
19.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 Local 3/4 Nicolas Ledez Secure SHell
20.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 Local 4/4 ssh -L P :S :W B $ ssh -L2001 :localhost :143 server.example.com Nicolas Ledez Secure SHell
21.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 Remote Nicolas Ledez Secure SHell
22.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 Dynamiques ssh -D 8080 AhostB Dans le navigateur proxy socks 127.0.0.1 port 8080 Nicolas Ledez Secure SHell
23.
Introduction
Local AuthentiïŹcation Remote Tunnel Dynamiques Divers X11 X11 AhostB # env | grep DISPLAY DISPLAY=localhost:10.0 The following connections are open: #1 x11 (t4 r3 i0/0 o0/0 fd 7/7 cfd -1) Nicolas Ledez Secure SHell
24.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting .conïŹg et ligne de commande admin@station:~$ cat ~/.ssh/config host * ForwardX11 yes User root ConnectTimeout 1 ForwardAgent yes ServerAliveInterval 60 admin@station:~$ ssh -o âConnectTimeout=10â AhostB Nicolas Ledez Secure SHell
25.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting Timeout ConnectTimeout Nicolas Ledez Secure SHell
26.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting AuthentiïŹcation ForwardAgent yes PasswordAuthentication no StrictHostKeyChecking no Nicolas Ledez Secure SHell
27.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting CaractĂšre dâĂ©chappement Alt-Gr-Ë AhostB # ~? Supported escape sequences: ~. - terminate connection ~B - send a BREAK to the remote system ~C - open a command line ~R - Request rekey (SSH protocol 2 only) ~^Z - suspend ssh ~# - list forwarded connections ~& - background ssh (when waiting for connections to te ~? - this message ~~ - send the escape character by typing it twice (Note that escapes are only recognized immediately after Nicolas Ledez Secure SHell
28.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting Scripting 1/4 c a t << "EOF" | ssh $1 / b i n / sh â ps âe d f âo comm, args | grep [ h ] t t p d | s o r t âu $ {ORACLE_HOME } / b i n / s q l p l u s " / as sysdba " << EOF s p o o l $ {ORACLE_BASE } / admin / $ { ORACLE_SID } / c r e a t e / s c o EOF c a t << EOF | ssh $1 / b i n / sh â chown âR $ {USERTOTO_NAME } : $ {USERTOTO_GROUP} $ {HOMED EOF Nicolas Ledez Secure SHell
29.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting Scripting 2/4 expect << EOF spawn ssh â t $1 passwd $ {USERTOTO_NAME} expect "New Password : " send " $ {USERTOTO_PASSWD } r " expect " Reâe n t e r new Password : " send " $ {USERTOTO_PASSWD } r " expect e o f EOF Nicolas Ledez Secure SHell
30.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting Scripting 3/4 c a t << "EOF" | ssh $1 / b i n / bash â SITES = / s i t e s i f [ âd $SITES ] ; then cd $SITES f o r s i t e i n â ; do NB_PROC= â ps âe d f | grep $ s i t e | grep âvc grep â i f [ $NB_PROC âeq 0 ] ; then echo " $ s i t e m i s s i n g " fi done fi Nicolas Ledez Secure SHell
31.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting Scripting 4/4 c a t << EOF > $ { SED_FILE } s %172.30.47.11.â hostname01 . â # Front âEnd%172.30.156.1 hostname01% s %172.30.47.14.â hostname04 . â # Front âEnd%172.30.156.1 hostname04% EOF c a t << EOF | ssh $1 / b i n / bash â | t e e r e p o r t / $1 echo â uname âa â uname âa echo EOF Nicolas Ledez Secure SHell
32.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting Conclusion Conclusion Nicolas Ledez Secure SHell
33.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting Bibliographie http ://gnrt.terena.org/content.php ?section_id=103 SSH, The Secure Shell : The DeïŹnitive Guide Ed. OâReilly & Associates Nicolas Ledez Secure SHell
34.
Introduction
Timeout AuthentiïŹcation AuthentiïŹcation Tunnel CaractĂšre dâĂ©chappement Divers Scripting Questions Questions ? Nicolas Ledez Secure SHell
Jetzt herunterladen