Provide steps on how to examine an SSH session with wireshark.

In Part 2, you will establish an SSH session with the localhost. Wireshark will be used to capture and
view the data of this SSH session.


a. Start another Wireshark capture.

b. You will establish an SSH session with the localhost. At the terminal prompt, enter ssh loc-
alhost. Enter yes to continue connecting. Enter the password cyberops when prompted.
```
[analyst@secOps ~]$ ssh localhost
The authenticity of host 'localhost (::1)' can't be established.
ECDSA key fingerprint is SHA256:uLDhKZflmvsR8Et8jer1NuD91cGDS1mUl/p7VI3u6kI.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'localhost' (ECDSA) to the list of known hosts.
analyst@localhost's password:
Last login: Sat Apr 29 00:04:21 2017 from localhost.localdomain
```
c. Stop the Wireshark capture.
d. Apply an SSH filter on the Wireshark capture data. Enter ssh in the filter field.
e. Right-click one of the SSHv2 lines in the Packet list section of Wireshark, and in the

drop-down list, select the Follow TCP Stream option.

f. Examine the Follow TCP Stream window of your SSH session. The data has been
encrypted and is unreadable. Compare the data in your SSH session to the data of your
Telnet session.
![15395|457x352](upload://u440MCuXebIA8H1QcfQkE988k6z.png)
g. After examining your SSH session, click Close.
h. Close Wireshark.
Reflection
Why is SSH preferred over Telnet for remote connections?
Answers may vary.

Similar to Telnet, SSH is used to access and execute commands on a remote system. However, SSH pro-
tocol allows users to communicate with a remote system securely by encrypting the communications.

This prevents any sensitive information, such as usernames and passwords, from being captured during
the transmission.

Computer Science & Information Technology

You might also like to view...

Messages that share the same subject line, and can be collapsed or expanded as needed are called ________

A) topics B) conversations C) threads D) themes

Computer Science & Information Technology

Sizing ________ display on a selected object that enable you to re-size the image

Fill in the blank(s) with correct word

Computer Science & Information Technology

With the data validation feature, you can restrict data to all of the following EXCEPT ____.

A. whole numbers B. decimal numbers C. text D. invalid entries

Computer Science & Information Technology

The biometric database is a collection of numerous computer files that consist of biometric sensor readings, templates, match results, and related end-user information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology