PuTTY Features and Usage - Certified Cybersecurity Technician PDF

Summary

This document details the features of PuTTY, a terminal application used for accessing remote systems using SSH. It covers SSH encryption, secure copy protocols (SCP and SFTP), and terminal emulation. The document also provides steps to use PuTTY to access remote Linux servers, including configuration options and security considerations.

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting Features of PuTTY o Control over the SSH encryption key and protocol version o...

Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting Features of PuTTY o Control over the SSH encryption key and protocol version o Command-line Secure Copy Protocol (SCP) and SSH File Transfer Protocol (SFTP) clients called “pscp” and “psftp,” respectively o Control over port forwarding with SSH (local, remote, or dynamic port forwarding), including built-in handling of X11 forwarding o Emulates most xterm, VT102 control sequences, as well as much of ECMA-48 terminal emulation o |IPv6 support o Supports the Triple Data Encryption Standard (3DES), Advanced Encryption Standard (AES), Arcfour, Blowfish, and DES o Public-key authentication support o Support for local serial port connections Steps to Use PuTTY to Access Remote Linux Servers o Launch PuTTY and select the Session tab from the left pane. o Enter the Host Name (or IP address) of the remote system to be connected and select Connection type. The selected connection type fills the default Port number automatically. Here, selecting SSH fills Port number 22. Click Open. PUTTY Configuration - (=] (@] Xx Category: Basic options for your PuTTY session _ Specify the destination you want to connect to Specfy Logging Host Name (or IP address) Port / v Terminal Terwiral [| 192.168.225. ——fe— —fe— | 22 Keyboard Connection type: gell Rawy Telnet Rlogin ¢* SSH Serial Features Load, save or delete a stored session Window Saved Sessions Appearance Behaviour Default Settings Load Translation Saye Saye Selection Delete Colours — Fonts ~» Connection Data Proxy Close window on exit: Telnet * Always Never Only on clean exit Rloain About I Open Qpen Cancel Figure 16.74: Use Putty to Access Remote Linux Servers Module 16 Page 1993 Certified Cybersecurity Technician Copyright © by EG-Council EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting o |If this is the first time the user is connecting to this remote system, PuTTY will display a security alert dialog box. Click Accept to add the remote system’s host key to PuTTY’s cache. PuTTY Security Alert - O X The server's host key is not cached. You have no guarantee that the server is the computer you think it is. The server's ssh-ed25519 key fingerprint is: ssh-ed25519 256 11:01:49:b1:3b:0d:4f:82:ee:b3:53:b7:38:09:25:2f If you trust this host, press "Accept” to add the key to PuTTY's cache and carry on connecting. If you want to carry on connecting just onck‘, onck, without adding the key to the cache, press "Connect Once". If you do not trust this host, press "Cancel” to abandon the connection. Accept Connect Once Cancel Figure 16.75: Putty Security Alert o Enter the remote system’s username and password. A connection is established to the remote system via SSH using PuTTY. * Documentation: https://help,ubuntu gement : ttps://landscape * Support: System information as of Fri Feb 8 11:01:39 UTC 2013 in: F or Enpl'l =3 Figure 16.76: Establish Remote System Connection Module 16 Page 1994 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting Steps to Access Remote Systems Configured with Key-based Authentication o Enter Host Name (or IP address) in the Session section. o Inthe Category pane, expand Connection, expand SSH, and then choose Auth. o Browse the location of the.ppk key file and click Open. Category: Options controlling SSH authentication Appearance 7 Display pre-authentication banner (SSH-2 only) ‘ \ Behaviour (") Bypass authentication entirely (SSH-2 only) : Transiation Authentication methods ‘ Selection Z Attempt authentication using Pageant Colours [_JAttempt TIS or CryptoCard auth (SSH-1) Fonts 7 Attempt "keyboard-interactive” auth (SSH-2) Connection ‘ Authentication parameters ‘ Data \ Proxy \ Allow agent forwarding | Telnet [_JAllow attempted changes of username in SSH-2 | Rlogin : SSH Browse... ‘ Kex ‘ Host keys Cipher | VAR | Y | About Qpen Cancel ‘ Figure 16.77: Browse for the Key File o Click Accept to add the host key if it is the first time the user is connecting to the remote system. Enter the remote system’s passphrase to connect. = |P Subnet Calculator A subnet is used to find information about IPv4 and IPv6 subnets as well as for the division of classes of subnets. For example, the SolarWinds Advanced Subnet Calculator helps ensure that IP addresses are not in conflict with one another and saves time in managing DHCP, DNS, and IP addresses. It allows the calculation of subnet masks and IP address management with the following: o Breaking down the IP address o Performing forward and reverse DNS resolution o Offering classful subnet calculations and CIDR subnet calculations o Providing a complete report of subnet addresses based on calculations Module 16 Page 1995 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting Details | Classful Subnet Calculator | CIOR Calculator | Subnet Addresses IP Address | o Generste e SubnetMask Suhnfllukl [ =]vI & sml Subnets 6 Details Detail: “.*ahl Mukfihl vlumdsm vlflmdsml | -I "I g Copy Copy "wahl vl Hosts per Subnet I vl Subnets Subnets SubnetBit Mask Subnet Mask || Figure 16.78: Solarwind’s Advanced Subnet Calculator Tunnels Up Subnet Calculator The web-based Tunnels Up Subnet Calculator is an IPv4 and IPv6 calculator that allows for the input of a netmask, a Cisco wildcard mask/CIDR notation. It allows performing reverse subnetting if the number of hosts is known and the netmask is unknown. Subnet Calculator 1P Address and Netmask: IP 10.0.1.1/16 Random IP IP Address: 10.0.1.1 Netmask: 255.255.0.0 Wildeard Mask: 0.0.255.255 CIDR Notation: /16 Network Address: 10.0.0.0 Usable Host Range: 10.0.0.1 - 10.0.255.254 Broadcast Address: 10.0.255.255 Binary Netmask: 11111111.11111111.00000000.00000000 Total number of hosts: 65,536 Number of usable hosts: 65,534 IP Class: A (0.0.0.0 - 127.255.255.255) Move to adjacent network Figure 16.79: Screenshot of Subnet Calculator Module 16 Page 1996 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser