Changes

Jump to: navigation, search

Lab 7 Warnings / Debrief

369 bytes removed, 10:28, 23 July 2015
no edit summary
In this lab, you will learn how to use '''ssh''', '''scp''', '''sftp''' commands to securely access and share data between authorized personnel. In addition, you will learn various methods of running and configuring an ssh server which include: using '''Public Key Authentication''', setting up an '''SSH tunnel''' in order to securely run graphical applications safely among computers in the network, '''disabling root login''', and '''changing the default ssh communication port''' to mislead potential penetration testers (also known as "pen-testers" or "hackers").
 
 
<u>Main Objectives</u>
 
* To set up, configure Secure Shell Services ('''ssh/sshd''')
* To use the '''ssh''', '''scp''', and '''sftp''' clients to access, copy, or transfer data among Linux servers in a secure manner
* Use ssh to '''tunnel X applications'''
* To tunnel network traffic via other communication ports
* To customize '''sshd''' to create a more private, secure system
==INVESTIGATION 1:==
<u>'''CONFIGURING AND ESTABLISHING AN Establishing a Safe SSH CONNECTIONConnection: Public Key Authentication'''</u>
13,420
edits

Navigation menu