Using SSH and SCP

Students will use the secure shell protocol to transfer files using encryption. Other methods such as FTP do not provide encryption and put the security of an organization or a user's credentials at risk. SSH is the standard, and SSH and SCP are widely used throughout the industry because of the security offered that was often lacking in older file transfer protocols.

Overview

Secure communion and secure authentication are critical to keeping a company or organization’s network resources protected. An SSH server uses a pair of asymmetrical keys which allows the session between the client and the server to be fully encrypted. This results in better security, and SSH has for the most part replaced FTP and telnet because of its use of encryption as opposed to the clear text transmission methods used by Telnet and FTP.

OUTCOMES

In this lab you will learn: 

  1. Setup an SSH Server 
  2. Connect to a SSH Server 
  3. Use SCP 

Key terms and descriptions

SCP
Secure Copy can be used to securely copy files between systems. SCP is a preferable method over FTP which is a clear text protocol.
SSH
Uses TCP port 22 and is a protocol that will allow you to securely administer a remote machine from the terminal.
Kali Linux
An Advanced Penetration Testing Linux distribution designed for digital forensics and penetration testing, ethical hacking, and network security assessments.
nmap
A port scanner which will indicate whether ports are open or closed on a remote system.
ssh-keygen
A Linux command that will generate the public and private keys needed for an SSH server to operate securely.