1 00:00:00,930 --> 00:00:02,730 So welcome back to this video. 2 00:00:02,850 --> 00:00:10,950 So as we have seen how to perform a search on a specific boat in our local machine that we did onto 3 00:00:10,950 --> 00:00:12,090 the paratroopers. 4 00:00:12,120 --> 00:00:16,440 Now we are going to do the similar thing onto a live server. 5 00:00:16,620 --> 00:00:25,320 Now this is the manage search portal of my website, which is hacked in, and now I'm going to perform 6 00:00:25,320 --> 00:00:28,490 a search to the host which is hacked ify. 7 00:00:29,010 --> 00:00:29,700 All right. 8 00:00:29,700 --> 00:00:36,090 So here you can see the access details, which gives the server IP, the username and the spot. 9 00:00:36,120 --> 00:00:42,570 Now, one thing that you should notice over here is I have changed the default port. 10 00:00:42,660 --> 00:00:48,450 So the default port is not 22 anymore, but it is 21098. 11 00:00:48,480 --> 00:00:56,280 This is specifically for those people or random bots who try to brute force on port number 22. 12 00:00:56,970 --> 00:00:57,540 All right. 13 00:00:57,540 --> 00:01:00,620 So let's quickly connect to this server IP. 14 00:01:00,630 --> 00:01:08,610 So I have copied the IP and let me just clear the screen for you first and such is the command and we 15 00:01:08,610 --> 00:01:16,740 know if we want to perform an SSH connection, we can use that with the help of the username. 16 00:01:16,740 --> 00:01:22,500 So I'm going to connect with the help of my username, which is this and the IP address. 17 00:01:22,530 --> 00:01:30,990 Now when I hit enter, it is going to take some time and it is going to give an error because by default 18 00:01:31,110 --> 00:01:34,410 search is trying on port number 22. 19 00:01:34,770 --> 00:01:42,930 But as we have seen, the search that is running onto the remote host that is hacked if I in is not 20 00:01:42,930 --> 00:01:46,410 on 22 but it is on 21098. 21 00:01:46,410 --> 00:01:48,210 So I'll just cancel this. 22 00:01:48,210 --> 00:01:53,760 And again, I'm going to specify the port number this time and try again. 23 00:01:53,760 --> 00:01:56,220 So it's 21098. 24 00:01:58,130 --> 00:02:01,520 And hit enter and let's wait this time. 25 00:02:01,520 --> 00:02:06,380 And you can see it asked me a prompt of entering a password. 26 00:02:06,380 --> 00:02:14,870 So let me just quickly enter the password for SSH and you can see I have successfully logged in into 27 00:02:14,870 --> 00:02:15,650 the machine. 28 00:02:16,430 --> 00:02:16,850 All right. 29 00:02:16,850 --> 00:02:18,740 So let me just do a list. 30 00:02:18,740 --> 00:02:23,540 And you can see these are all the directories that are hosted onto the server. 31 00:02:23,570 --> 00:02:26,680 Now I can modify things here as I want. 32 00:02:26,690 --> 00:02:31,580 I can upload download files, etc. onto the active file and server. 33 00:02:31,610 --> 00:02:33,350 So I hope you guys understood this. 34 00:02:33,350 --> 00:02:37,190 How you can perform a search on local and remote servers. 35 00:02:37,220 --> 00:02:43,730 It is exactly the same process, but in this specific video I wanted to show that yes, since admins 36 00:02:43,730 --> 00:02:51,170 use different port numbers on live production servers this way and this is the way in which you can 37 00:02:51,170 --> 00:02:53,690 connect SSH to those portals. 38 00:02:53,900 --> 00:02:55,220 I hope you guys understood. 39 00:02:55,250 --> 00:02:56,000 Thank you.