As the internet grew, the security risks related to using SSH also became visible to users. To overcome these security risks, developers released a new tool called Secure Shell or SSH.
It provides the same functionality as Telnet, but in a secure encrypted tunnel.
For the Linux systems, we can use OpenSSH for SSH connections. It is a free tool for Linux and can be installed using apt
. We have discussed the installation and configuration of OpenSSH in previous chapters.
In this section, we will see how using SSH instead of Telnet can secure our data:
- Once SSH is installed and configured, we can try to connect to the server using SSH as shown here. Enter the password when prompted:
- At the same time, if we try to capture the traffic using Wireshark, we get the following details:
In the previous screenshot, we can see in the last lines that a Key Exchange was initiated between the client and server.