Now go to data and give Auto-login username. Now open the putty configuration tab, then go to Session tab and give the IP Address & Port Number of your Clients Machine were ssh server is configured. Now copy this key and paste it in the empty file named authorized_keys using nano command and save it. ssh folder and type the following command: puttygen -L "ssh_login.ppk" After that copy the “ ssh_login.ppk” file which was created using PuTTy Key Generator previously and paste it into the. ssh and then create an empty text file with the name authorized_keys in the same folder. The above command will create a folder named. Now open the Ubuntu terminal of our server and type ssh-keygen. Once Public and Private Key are generated, click on Save Private Key. ppk extension)Ĭlicking on Generate will initiate the process of generating a Public and Private Key, as shown in the image. Note: PuTTYgen is a key generator tool for creating SSH keys for PuTTY and stores keys in its own format (. To begin with this security measure we need to download and install PuTTY Key Generator. With the next output of nmap, it is clearly visible that SSH services are running on TCP Port 2222 along with the description of the OpenSSH version. So we will run the following nmap command with version detection option nmap -sV 192.168.1.104 The output of the nmap shows that TCP port 2222 is opened however, shows EthernetIP-1 in the service description which doesn’t give an exact description of the service running. Now to confirm port forwarding, we will again scan the Client’s IP address using nmap nmap 192.168.1.104 Hence, in this way we have forwarded the port from 22 to 2222. Now change the port 22 to port 2222 as shown in the below screenshot and save the changes made in the sshd_config file. Open the file sshd_config using nano command. Navigate to /etc/ssh and we will find a file named sshd_config in the client’s machine. Upon initiating the scan on the client’s machine IP address using nmap, it shows that SSH is running on Port 22. Once the SSH services are configured and running, we can begin with our first security measure which is Port Forwarding. Disable Root Login and Limit SSH User’s Accessīefore moving on, Let us first install an SSH server on our client machine using the following command.Disable Password-Based Login And Using PGP Key (Public Key).This article will be explaining about the network securities which help the network administrator to secure the service of SSH on any server through multiple ways. The best application of SSH is to remotely login into computer systems by users. Secure Shell ( SSH) is defined as a network protocol to operate network services securely over an unsecured network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |