• Post category:StudyBullet-3
  • Reading time:9 mins read


Learn SSH, scp, sFTP, SSH tunnels and secure your servers and network

What you will learn

Use client and server configuration files to cutomize SSH to your very needs

Securely trasnfer files and directories over the network using the secure shell

Enhance authentication security by enforcing public/private key authentication

Run GUI applications over the network through SSH X11 forwarding

Bypass local and remote firewalls using SSH tunnels

Create your own SOCKS5 proxy using only SSH

Description

Whether you are a UNIX/Linux administrator, a casual user, a macOS owner, or even a Microsoft Windows user, you’ve probably used SSH (secure shell) in some way or another. This course is going to uncover some of the less-known features of SSH. Yes, it will teach SSH for the total beginner, but it will also show SSH veterans some tips and tricks that perhaps they don’t know ever existed.

I tried to make this class as modular as possible. This means that you could skip lectures whose topics you already know, and watch only what want to gain knowledge about. You can view the lectures in any order you want because they are largely non-dependent on each other.

In this class we explore the following:

  • The difference between SSH and OpenSSH (they’re more related than you think)
  • Installing OpenSSH on Ubuntu (they don’t ship with that by default)
  • Installing SSH clients on Windows 10: we use the most popular clients PuTTY and mobaXterm
  • The “security by obscurity” principle: learn how to change the default SSH port to make it harder for hackers to know your system.
  • Allow SSH connections from only a selected network interface(s) to add even more control over your network.
  • Display the message of the day banner to your SSH users. You can use that to enforce policies, remind of company rules, or just say “Good morning!”
  • Limit SSH logins to specific users and groups. Having an SSH client does not necessarily mean that the user is allowed to log in.
  • Some PuTTY tips and tricks for Windows users

Then we move to the SCP and sFTP part where we learn more about the secure transfer of files over the network. It has never been easier or more secure to upload/download files over the existing SSH deployment. No need to install HTTP/FTP servers.


Get Instant Notification of New Courses on our Telegram channel.


Next, we explore how we can run GUI programs remotely over SSH. Ever thought you could run Firefox from the server and display its interface on your own client? That’s X11 forwarding and we’ll study it in detail.

Finally, the fun part: SSH tunnels. We’ll learn how to use jump servers to securely connect to servers that are not publicly accessible, “bypass” firewall rules in some situations, and discover how the SOCKS proxy can be extremely useful when you need a secure proxy server.

Have a look at the preview videos and ENROLL now! I’ll be waiting for you in lecture 1.

English
language

Content

Installing OpenSSH server and clients
The difference between SSH and OpenSSH
Installing OpenSSH on Ubuntu
Testing your SSH setup
Installing Bash on Windows 10
Installing PuTTY on Windows
Installing MobaXterm on Windows
Configuring your OpenSSH server
Security by obscurity: changing the default port
Restricting connections to a specifc interface/protocol
Displaying a banner and message of the day
Limiting access to specific users and groups
Controlling direct root login
Configuring your SSH client
Basic ssh command usage
Connecting to a non-default SSH port
Saving SSH client settings per user
Some PuTTY tips and tricks
Using SSH to transfer files over the network
How secure is FTP? Let’s attack it!
The SCP way
WinSCP client for Windows
MobaXterm client for Windows
SFTP tips and tricks
Changing scp and sftp default settings
“Chrooting” sftp users, how web hosting companies do it
Authentication using Public/Private keys
What is key-based authentication?
Generating a key pair and protecting the private key
Loging-in with your key pair (Linux client)
Using ssh-copy-id tool to automatically upload the public key (Linux client)
Using PuTTY and PuttyGen for key-based authentication (Windows client)
Automating key-based login using Pageant (Windows client)
Make Pageant automatically load keys and start on Windows boot
Using SSH agent on text-only terminals
Disabling password-based authentication totally in favor of the key-based one
Restricting password-based authentication to specific groups
Hopping from one server to another using Agent Forwarding
Display GUI programs over SSH using X11 forwarding
What is X11 forwarding?
Launching Ubuntu Firefox on Centos
Launching Ubuntu Firefox on Windows using PuTTY and Xming
Using MobaXterm as an X11 client on Windows
X11 Forwarding tips and tricks
SSH tunnels
What are SSH tunnels?
Local SSH tunnel use case 1: securing HTTP traffic without using HTTPS
Local SSH tunnel use case 2: bypassing remote firewalls
Local SSH tunnel use case 3: securing telnet traffic
Create a local SSH tunnel using PuTTY
Reverse SSH tunnel use case: create a cheap, simple VPN
Dynamic SSH port forwarding: bypass regional network restrictions using SOCKS5
Create a dynamic SSH tunnel (SOCKS5 proxy) using PuTTY
Advanced SSH tunnelling techniques
Start SSH tunnels in the background
Control public network access to your local SSH tunnel
Control public network access to your reverse SSH tunnel
Use a third host (gateway) to establish a local SSH tunnel
Using your own machine as a gateway to connect two firewalled hosts