AcademyTerminal Tactics: Survival in the ShellPhase 11: Remote Infiltration (SSH)

Module 11: SSH & Remote Access

In DevOps, you rarely sit in front of the physical server. You use SSH (Secure Shell) to manage servers across the world.

Step 1: The Master Key

Passwords are weak. SSH Keys are the industry standard for secure login. A key pair consists of a Private Key (stay on your machine) and a Public Key (goes on the server).

Mission: Generate a 4096-bit RSA key pair. Run: ssh-keygen -t rsa -b 4096 -f ~/.ssh/id_rsa -N ""

Step 2: The Address Book

Instead of typing ssh user@long-ip-address.com, you can use an ssh config file to create nicknames for your servers.

Mission: Create your SSH config file. Run: touch ~/.ssh/config

booting...

Mission Control

Generate an SSH Key Pair

Expected Command

ssh-keygen -t rsa -b 4096 -f ~/.ssh/id_rsa -N ''

Understanding SSH Config