SSH Into a Vagrant Box and Installing Software

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 51 minutes
Difficulty
Beginner
CEU/CPE
3
Video Transcription
00:00
Hello. My name is Jasmine Jackson and our courses intro to vagrant and in this less and we will discuss how to use secure shell into our vagrant machine, as well as a stalling software onto our favorite machine. Let's begin.
00:18
So are learning objectives are
00:21
learning the brief history and common functions of secure show how secure shell fits into vagrant and how to install software onto our vagrant machine.
00:32
Let's go
00:36
brief history and functions of secure shell
00:40
So secure show or secure sockets show is a network protocol that gives a secure way to access a computer over an unsecured network. So you may be wondering, OK, jasmine, that sounds great. It's a lot of words.
00:56
What are you really trying to say? So an example of this is connecting over the Internet
01:02
as you may or may not know when the Internet was being created, security was not a focal point or in the forefront. So where we want to connect to another computer
01:15
over the Internet, we will use most times. We will use secure shell to do that because it provides a secure way between our host computer to the remote computer to be connected over the Internet.
01:32
So some capabilities of secure shell are
01:36
connecting local machine connecting a local machine toe to a remote host. So that was the example I just gave of
01:46
connecting over the Internet that fits into that category.
01:51
Secure remote access to a resource, remote execution of commands, delivery of software patches and updates, and finally, other administrative or management tasks.
02:05
So
02:06
now we have learned about secure show, and you may be wondering, OK, how does that fit with a stalling software?
02:14
So
02:15
for vagrants,
02:17
we will use the command vagrant ssh to create a secure shell to our vagrant machine. And from there, we command really install software on our machine. So the good thing about using a secure shell is that everything that we will do will be on the command line.
02:37
So if you're a command line, Gruber or command line ninja, then using vagrants
02:46
Ssh o are using a secure share will be your best bet, because then you would not have to interact with the virtual virtualization software again. Virtual box are VM ware. And again, from our examples, we have be using the Embu to trustee 64
03:07
pretty configure machine. So again, this is like any other
03:10
Mobutu Lennix box so we can install software on our vagrant machine as we would any other limits machine.
03:20
So we have a quick, quick is
03:23
question. What is the command used to create a secure show into our vagrant machine?
03:30
Is it a up be in it? See down or d ssh! I will give you a couple of seconds and then I will come back with my answer. Let's start now.
03:42
And the answer is Papa Papa
03:46
de Ssh!
03:49
So remember to create a secure show into our vagrant machine it is. The command is vagrant. Ssh! So the answer is D
04:00
so in summary in this video, we discussed the brief history and common functions of secure show How secure shelf it's It's a vagrant again, if you like using the command line,
04:15
using the secure show will be good because then you won't have to interact with the gooey or the graphical user interface.
04:23
Also, we also discussed how to install software onto our vagrant machine. So in the next couple of videos, I will have demos on how to you secure shelled to gain access into our vagrant machine
04:39
as well as installing software onto our vagrant machine.
04:44
I will be installing the Apache. Http server so I can't wait to see you in the next two videos and have a good day. Bye.
Up Next