SSH (22)

Secure Shell.

chevron-rightProtocol Informationhashtag

SSH (Secure Shell) is a remote administration protocol that offers encryption and is the successor to Telnet. It is generally used for remote access to servers and systems. SSH authentication can be configured in two main ways: user/password, or with key.

Port

22 TCP

SSH

Config File

  • Linux: /etc/ssh/sshd_config

  • Windows: %ProgramData%\ssh\sshd_config

Interact

If anonymous access is enabled, it's possible log in with username “Anonymous” and password “”.

ssh <USER>@<IP>
ssh -i <KEY> <USER>@<IP>

SSH Key

ssh-keygen

Move the public key in ~/.ssh/authorized_keys target machine (append if it already exists).

Algorithm
Private Key
Public Key

RSA

id_rsa

id_rsa.pub

DSA (obsolete)

id_dsa

id_dsa.pub

ECDSA

id_ecdsa

id_ecdsa.pub

Ed25519 (recommended)

id_ed25519

id_ed25519.pub

Upload Key on Server SSH

scp

Last updated