SlideShare a Scribd company logo
• SSH is a protocol for secure remote access to a machine over networks which are
not trusted
• Created by Tatu Ylönen, a student of Helsinki University of Technology
• SSH is a replacement for telnet, rsh, rlogin and can replace ftp
• Uses Encryption
• SSH is not a shell like Unix Bourne shell and C shell (wildcard expansion and
command interpreter)
• Transmission is secure
• Transmission can be compressed
Secure Command Shell
Port Forwarding
Secure file transfer
Allow you to edit files
View the contents of directories
Custom based applications
Create user accounts
Change permissions
Anything can be done from command prompt can be done remotely and securely
SECURE SHELL
Port Forwarding
Powerful Tool.
Provide security to TCP/IP applications including e-mail, sales and customer contact
databases, and in-house applications.
Allows data from normally unsecured TCP/IP applications to be secured.
Secure File Transfer
Secure File Transfer Protocol (SFTP) is a subsystem of the Secure Shell protocol
Separate protocol layered over the Secure Shell protocol to handle file transfers
SFTP encrypts both the username/password and the data being transferred.
Uses the same port as the Secure Shell server, eliminating the need to open another
port on the firewall or router
Using SFTP also avoids the network address translation (NAT) issues that can often
be a problem with regular FTP
An ideal use of SFTP is to fortify a server or servers outside the firewall or router
accessible by remote users and/or partners (sometimes referred to as a secure
extranet or DMZ).
Secure shell
Data Integrity
Data integrity guarantees that data sent from one end of a transaction arrives
unaltered at the other end. Even with Secure Shell encryption, the data being sent
over the network could still be vulnerable to someone inserting unwanted data into
the data stream. Secure Shell version 2 (SSH2) uses Message Authentication Code
(MAC) algorithms to greatly improve upon the original Secure Shell's (SSH1) simple
32-bit CRC data integrity checking method.
Data Encryption
When a client establishes a connection with a Secure Shell server, they must agree
which cipher they will use to encrypt and decrypt data. The server generally
presents a list of the ciphers it supports, and the client then selects the first cipher in
its list that matches one in the server's list.
Encryption, sometimes referred to as privacy, means that your data is protected
from disclosure to a would-be attacker "sniffing" or eavesdropping on the wire.
Ciphers are the mechanism by which Secure Shell encrypts and decrypts data being
sent over the wire.
Reasons to use SSH
Arbitrary TCP/IP ports can be redirected through the encrypted channel in both
directions
The software can be installed and used (with restricted functionality) even
without root privileges.
Optional compression of all data with gzip (including forwarded X11 and TCP/IP
port data), which may result in significant speedups on slow connections.
SSH it is possible to create a secure communication channel between the server
and the client.
This channel can be used for different purposes, not necessarily for launching a
remote terminal session but also for sending any data using the forwarding
feature.
SSH supports a variety of authentication methods, and new options may be
added if required.
Both the client and the server can authenticate each other to enhance security
against different kinds of attacks.
Protects Against:
IPS Spoofing
DNS Spoofing
IP Source Routing

More Related Content

PPTX
Secure SHell
PPTX
Secure Shell(ssh)
PPTX
PPTX
Ssh (The Secure Shell)
PPT
Introduction to SSH
PPT
Secure shell protocol
PDF
SSH - Secure Shell
PDF
Secure SHell
Secure Shell(ssh)
Ssh (The Secure Shell)
Introduction to SSH
Secure shell protocol
SSH - Secure Shell

What's hot (20)

PPT
Secure shell ppt
PDF
An introduction to SSH
PPTX
Transport Layer Security
PPTX
Kerberos
PPTX
Desktop virtualization
PPT
SSH.ppt
PPTX
kerberos
PPTX
Kerberos Authentication Protocol
PPT
X.509 Certificates
PDF
MD-5 : Algorithm
PPTX
Data security in cloud computing
PPTX
Key management and distribution
PPTX
Public key infrastructure
PPT
Firewalls
PPTX
Dns presentation
PDF
Email security presentation
PPT
11 distributed file_systems
PDF
Web Security
PPT
Security Attacks.ppt
Secure shell ppt
An introduction to SSH
Transport Layer Security
Kerberos
Desktop virtualization
SSH.ppt
kerberos
Kerberos Authentication Protocol
X.509 Certificates
MD-5 : Algorithm
Data security in cloud computing
Key management and distribution
Public key infrastructure
Firewalls
Dns presentation
Email security presentation
11 distributed file_systems
Web Security
Security Attacks.ppt
Ad

Viewers also liked (20)

PPT
Unix command-line tools
DOC
How to send files to remote server via ssh in php
PDF
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
PPTX
Secure Shell - a Presentation on Ethical Hacking
PDF
Survey on data mining techniques in heart disease prediction
PPTX
Crusoe Micorprocessor
PPTX
Bluejacking
PPSX
Femtocells
PPT
Holographic Memory
PDF
Heart Disease Prediction Using Data Mining Techniques
PPTX
Imap(internet massege access protocaols)
PPTX
Bluejacking sadhana
PPT
Survey on data mining techniques in heart disease prediction
PPT
Holographic data storage
PPT
Holographic Data Storage
PPTX
Holographic data Storage
PPTX
HEART DISEASE PREDICTION USING NAIVE BAYES ALGORITHM
PPTX
FEMTOCELL
PPTX
Finger Reader o Anillo Lector
PPTX
Femtocell
Unix command-line tools
How to send files to remote server via ssh in php
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Secure Shell - a Presentation on Ethical Hacking
Survey on data mining techniques in heart disease prediction
Crusoe Micorprocessor
Bluejacking
Femtocells
Holographic Memory
Heart Disease Prediction Using Data Mining Techniques
Imap(internet massege access protocaols)
Bluejacking sadhana
Survey on data mining techniques in heart disease prediction
Holographic data storage
Holographic Data Storage
Holographic data Storage
HEART DISEASE PREDICTION USING NAIVE BAYES ALGORITHM
FEMTOCELL
Finger Reader o Anillo Lector
Femtocell
Ad

Similar to Secure shell (20)

PPTX
Remote Accesserver, Introduction(Part1).pptx
PPTX
SSh_part_1.pptx
PPT
Ssh And Rlogin
PPT
Ssh
PPTX
Telnet & Secure Shell
PPT
By Nithin & group
PPTX
A presentation on SSH (Secure Shell or Secure Socket Shell)
PPT
SSH.ppt
PPT
Transport layer security.ppt
PDF
VULNERABILITIES OF THE SSL/TLS PROTOCOL
PDF
Vulnerabilities of the SSL/TLS Protocol
PDF
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
PPTX
Ecommerce final ppt
PPTX
ssl-tls-ipsec-vpn.pptx
PDF
Windowshadoop
PDF
Meeting 5.2 : ssh
PDF
Transport Layer Security
PPT
Remote1
PPTX
Ssl and tls
PPTX
Remote Accesserver, Introduction(Part1).pptx
SSh_part_1.pptx
Ssh And Rlogin
Ssh
Telnet & Secure Shell
By Nithin & group
A presentation on SSH (Secure Shell or Secure Socket Shell)
SSH.ppt
Transport layer security.ppt
VULNERABILITIES OF THE SSL/TLS PROTOCOL
Vulnerabilities of the SSL/TLS Protocol
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Ecommerce final ppt
ssl-tls-ipsec-vpn.pptx
Windowshadoop
Meeting 5.2 : ssh
Transport Layer Security
Remote1
Ssl and tls

Recently uploaded (20)

PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Sports Quiz easy sports quiz sports quiz
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Complications of Minimal Access Surgery at WLH
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
master seminar digital applications in india
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Sports Quiz easy sports quiz sports quiz
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Insiders guide to clinical Medicine.pdf
Basic Mud Logging Guide for educational purpose
O7-L3 Supply Chain Operations - ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Computing-Curriculum for Schools in Ghana
VCE English Exam - Section C Student Revision Booklet
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
master seminar digital applications in india
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025

Secure shell

  • 1. • SSH is a protocol for secure remote access to a machine over networks which are not trusted • Created by Tatu Ylönen, a student of Helsinki University of Technology • SSH is a replacement for telnet, rsh, rlogin and can replace ftp • Uses Encryption • SSH is not a shell like Unix Bourne shell and C shell (wildcard expansion and command interpreter) • Transmission is secure • Transmission can be compressed Secure Command Shell Port Forwarding Secure file transfer Allow you to edit files View the contents of directories Custom based applications Create user accounts Change permissions Anything can be done from command prompt can be done remotely and securely SECURE SHELL
  • 2. Port Forwarding Powerful Tool. Provide security to TCP/IP applications including e-mail, sales and customer contact databases, and in-house applications. Allows data from normally unsecured TCP/IP applications to be secured. Secure File Transfer Secure File Transfer Protocol (SFTP) is a subsystem of the Secure Shell protocol Separate protocol layered over the Secure Shell protocol to handle file transfers SFTP encrypts both the username/password and the data being transferred. Uses the same port as the Secure Shell server, eliminating the need to open another port on the firewall or router Using SFTP also avoids the network address translation (NAT) issues that can often be a problem with regular FTP An ideal use of SFTP is to fortify a server or servers outside the firewall or router accessible by remote users and/or partners (sometimes referred to as a secure extranet or DMZ).
  • 4. Data Integrity Data integrity guarantees that data sent from one end of a transaction arrives unaltered at the other end. Even with Secure Shell encryption, the data being sent over the network could still be vulnerable to someone inserting unwanted data into the data stream. Secure Shell version 2 (SSH2) uses Message Authentication Code (MAC) algorithms to greatly improve upon the original Secure Shell's (SSH1) simple 32-bit CRC data integrity checking method. Data Encryption When a client establishes a connection with a Secure Shell server, they must agree which cipher they will use to encrypt and decrypt data. The server generally presents a list of the ciphers it supports, and the client then selects the first cipher in its list that matches one in the server's list. Encryption, sometimes referred to as privacy, means that your data is protected from disclosure to a would-be attacker "sniffing" or eavesdropping on the wire. Ciphers are the mechanism by which Secure Shell encrypts and decrypts data being sent over the wire.
  • 5. Reasons to use SSH Arbitrary TCP/IP ports can be redirected through the encrypted channel in both directions The software can be installed and used (with restricted functionality) even without root privileges. Optional compression of all data with gzip (including forwarded X11 and TCP/IP port data), which may result in significant speedups on slow connections. SSH it is possible to create a secure communication channel between the server and the client. This channel can be used for different purposes, not necessarily for launching a remote terminal session but also for sending any data using the forwarding feature. SSH supports a variety of authentication methods, and new options may be added if required. Both the client and the server can authenticate each other to enhance security against different kinds of attacks. Protects Against: IPS Spoofing DNS Spoofing IP Source Routing