Skip to content

Notes Class 07

Sierra Maldonado edited this page Jan 26, 2023 · 2 revisions

SSH Protocol

What is the Secure Shell (SSH) Protocol?

The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another.

What are the typical uses of the SSH protocol?

The protocol is used in corporate networks for:

  • providing secure access for users and automated processes
  • interactive and automated file transfers
  • issuing remote commands
  • managing network infrastructure and other mission-critical system components.

How does the SSH protocol work?

The protocol works in the client-server model, which means that the connection is established by the SSH client connecting to the SSH server. The SSH client drives the connection setup process and uses public key cryptography to verify the identity of the SSH server. After the setup phase the SSH protocol uses strong symmetric encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged between the client and server.

How is the data kept safe when transmitted between the SSH client and server?

The data that is transmitted is encrypted according to the parameters negotiated in the setup. During the negotiation the client and server agree on the symmetric encryption algorithm to be used and generate the encryption key that will be used.

What is SFTP?

The SFTP (SSH File Transfer Protocol) is probably the most widely used secure file transfer protocol today

What is RDP? And how to use it

What is Windows Remote Desktop Connection?

The Windows Remote Desktop Connection tool gives users the ability to connect to a remote Windows PC or server over the internet or on a local network, giving them full access to the tools and software installed on it.

What is RDP?

The Remote Desktop Protocol allows remote users to see and use Windows on a device in another location. For RDP connections to work, you need two components—an RDP server and an RDP client.

What is the RDP port number?

The RDP port (port 3389) is well known and regularly scanned for exploits.

Things I want to know more about

If you want to remote to someone else's computer, do you them to download software first?

Clone this wiki locally