Kali Linux 0 dan: Windows’da O‘rnatish + Terminal + Buyruqlar

1) Windows’da Kali o‘rnatish (VirtualBox)

2) Terminal asoslari

pwd
ls -la
cd /var/log
clear
whoami

3) Fayl tizimi

mkdir test
touch a.txt
cp a.txt b.txt
mv b.txt docs/
rm a.txt
cat file.txt
less file.txt

4) User va ruxsatlar

id
groups
chmod 644 file.txt
chmod +x script.sh
chown user:user file.txt

5) Paketlar (APT)

sudo apt update
sudo apt upgrade -y
apt search nmap
sudo apt install nmap -y
sudo apt remove paket_nomi

6) Tarmoq buyruqlari

ip a
ip r
ping -c 2 8.8.8.8
nslookup kali.org
curl -I https://example.com
ss -tulpn
sudo ufw status

7) Loglar

ls /var/log
sudo tail -n 50 /var/log/auth.log
journalctl -xe

8) Asosiy cyber tools (xavfsiz)

9) Mini cheatsheet

# file transfer
python -m http.server 8080
wget http://IP:8080/file -O newname

# process
ps aux | head
top

# disk
df -h
du -sh *

📞 Aloqa

Savollar bo‘lsa yozing:

Kali Linux nima?

Kali Linux — kiberxavfsizlik uchun mo‘ljallangan Linux distributivi. Unda tarmoq diagnostikasi, web xavfsizlik testi, forensics, OSINT va boshqa yo‘nalishlar uchun ko‘plab tayyor tool’lar bor.

Windows nima? Linux nima?

  • Windows — ko‘pchilik ishlatadigan operatsion tizim (UI qulay, ko‘p dasturlar).
  • Linux — serverlar va kiberxavfsizlikda juda ko‘p ishlatiladigan OS oilasi (moslashuvchan, kuchli terminal).
Maqsad: Siz bu sahifada 0 dan boshlab: o‘rnatish → terminal → fayl tizimi → ruxsatlar → tarmoq buyruqlari → loglar → amaliy lab.

Terminal asoslari

pwd # qaysi papkadasiz ls -la # fayllar ro‘yxati cd /home/kali mkdir test touch file.txt cat file.txt

Fayl ruxsatlari (Permissions)

Linux’da fayl ruxsati: owner / group / others. Asosiy: r (read), w (write), x (execute).

ls -l chmod 644 file.txt chmod +x script.sh sudo chown kali:kali file.txt

Processlar (Jarayonlar)

ps aux top htop kill -9 PID

APT paket manager

sudo apt update sudo apt install htop curl wget -y sudo apt remove paket_nomi -y

Tarmoq buyruqlari (diagnostika)

ip a ip r ping -c 3 8.8.8.8 nslookup kali.org curl -I https://kali.org ss -tunap
Qonuniy eslatma: skan/tekshiruvlarni faqat ruxsatli labda bajaring.

Kali Linux nima?

Kali Linux — bu kiberxavfsizlik (pentest, forensika, tarmoq tahlili) uchun tayyorlangan Linux distributivi. Unda ko‘plab xavfsizlik asboblari (Nmap, Wireshark, Burp Suite va boshqalar) oldindan o‘rnatilgan bo‘ladi.

Qonuniy eslatma: bu sahifadagi bilimlar faqat o‘zingizga tegishli lab/VM va ruxsat berilgan tarmoqlarda ishlatiladi.

Windows’da Kali o‘rnatish (eng oson yo‘l)

  1. VirtualBox o‘rnating (Windows uchun).
  2. Kali’ning VirtualBox image (OVA) yoki ISO’ni yuklab oling.
  3. OVA bo‘lsa: File → Import Appliance orqali import qiling.
  4. Network: lab uchun odatda NAT yoki Host‑Only. (Internet kerak bo‘lsa NAT, faqat lokal lab bo‘lsa Host‑Only)

Keyinroq shu sahifaga “step-by-step screenshot” bo‘limini ham qo‘shib boraman.

Terminal asoslari (0 dan)

Fayl/papkalar

pwd            # qayerdaligini ko‘rsatadi
ls -la         # fayllar ro‘yxati (yashirinlar bilan)
cd /var/log    # papkaga kirish
mkdir lab      # papka yaratish
touch test.txt # fayl yaratish
cp a b         # nusxa olish
mv a b         # ko‘chirish/nomini o‘zgartirish
rm -r folder   # papkani o‘chirish (ehtiyot!)

Matn ko‘rish va qidirish

cat file.txt
less file.txt
head -n 20 file.txt
tail -n 50 file.txt
grep -n "error" /var/log/syslog
grep -R "password" /etc 2>/dev/null

Oxirgi buyruq (grep -R) katta joyda sekin bo‘lishi mumkin.

Ruxsatlar: chmod / chown (tushuncha)

Linux’da har bir faylning egasi va ruxsatlari bo‘ladi: r (read), w (write), x (execute).

ls -l
chmod 644 file.txt   # rw-r--r--
chmod 755 script.sh  # rwxr-xr-x
chown user:user file.txt
Maslahat: “777”ni odat qilmang — xavfsizlikni pasaytiradi.

Protsesslar va tizim monitoringi

ps aux
top
htop
free -h
df -h
du -sh *

Forensika/monitoring uchun foydali: lsof (ochiq fayl va soketlar), strace (sistem chaqiriqlar).

Tarmoq asoslari (Kali’da)

ip a            # interfeyslar
ip r            # routing
ss -tulnp       # tinglayotgan portlar (zamonaviy netstat)
ping -c 3 8.8.8.8
traceroute example.com
dig kali.org

Ko‘p Linux distributivlarda netstat o‘rniga ss ishlatiladi.

SSH: masofaviy ulanish (xavfsiz ishlatish)

ssh user@IP
ssh -p 2222 user@IP
scp file.txt user@IP:/home/user/
scp user@IP:/home/user/log.txt .

Trafik tahlili: ss + tcpdump

ss misollar

ss -tulpn                 # portlar + process
ss -tan                    # TCP ulanishlar
ss -o state established     # faqat established

tcpdump misollar

sudo tcpdump -i any -nn
sudo tcpdump -i eth0 port 80
sudo tcpdump -i eth0 host 192.168.1.10
sudo tcpdump -i eth0 -w traffic.pcap

PCAP’ni Wireshark’da ochib analiz qilasiz.

Loglar: /var/log va journalctl

ls /var/log
sudo tail -n 100 /var/log/auth.log
sudo journalctl -u ssh --since "today"
sudo journalctl -p err -b

Paketlar: apt (o‘rnatish/yangilash)

sudo apt update
sudo apt upgrade
apt search nmap
sudo apt install nmap
sudo apt remove paket_nomi

Keyingi qadamlar