SSH va Nmap 0 dan: Xavfsiz Labda O‘rganamiz

⚠️ Muhim qoida

Bu darslik faqat o‘zingizga tegishli yoki ruxsat berilgan lab/hostlarda ishlash uchun. Begona tarmoqlarni skan qilish — qonun buzilishi bo‘lishi mumkin.

1) SSH 0 dan

SSH — masofadagi kompyuterga shifrlangan terminal orqali ulanish.

# basic ulanish
ssh user@IP

# port boshqa bo'lsa
ssh -p 2222 user@IP

Foydali buyruqlar

# ulanish tarixini tekshirish
ls ~/.ssh

# host key ogohlantirish bo'lsa (ehtiyot!)
ssh-keygen -R IP

2) SSH key (kalit)lar

Parol o‘rniga kalit ishlatsa bo‘ladi: xavfsizroq va qulayroq.

# kalit yaratish
ssh-keygen -t ed25519 -C "otabek"

# public key ni serverga qo'shish (ruxsatli host)
ssh-copy-id user@IP

3) ~/.ssh/config

Host mylab
  HostName 192.168.56.10
  User kali
  Port 22
  IdentityFile ~/.ssh/id_ed25519

Keyin: ssh mylab deb ulanasan.

4) Nmap 0 dan

Nmap — tarmoq diagnostika va audit uchun port/service aniqlash vositasi.

# host tirikligini tekshirish
nmap -sn 192.168.56.0/24

# oddiy port scan (o'z lab IP'ingizda)
nmap 192.168.56.10

5) Eng foydali flaglar

# to'liqroq (lab)
sudo nmap -p- -sS -sV 192.168.56.10

# os+script (faqat lab)
sudo nmap -A 192.168.56.10

6) Xavfsiz amaliyot (lab)

Lab tavsiyasi

  • VirtualBox: Kali + test VM
  • Host-only network
  • IP lar 192.168.56.x

Checklist

  • Ruxsat bormi?
  • Qaysi IP/Scope?
  • Log yozib bor
  • Keraksiz agressiv skan qilma

📞 Aloqa

Savollar bo‘lsa yozing:

Nmap (0 dan) — ruxsatli audit uchun asoslar

Nmap — tarmoqdagi host va servislarni aniqlash uchun ishlatiladigan vosita. Uni faqat o‘zingizga tegishli yoki ruxsat berilgan lab/tizimlarda ishlating.

1) Eng oddiy tekshiruv (o‘zingizning kompyuteringiz)

nmap 127.0.0.1 nmap localhost

Bu sizning lokal kompyuteringizdagi ochiq portlarni ko‘rsatadi.

2) Ma’lum portlarni tekshirish

nmap -p 22,80,443 192.168.1.10

-p — port(lar)ni aniq ko‘rsatish. Labda ishlating.

3) Servis versiyasini bilish (himoyachi uchun foydali)

nmap -sV -p 22,80,443 192.168.1.10

Izoh: Servis versiyasi patch/yangilash zarurligini tushunishga yordam beradi.

4) Natijani tushunish

  • open — port ochiq, servis javob beryapti
  • closed — port yopiq, lekin host javob beradi
  • filtered — firewall/filtr sabab javob yo‘q

5) Xavfsiz amaliyot qoidalari

  • Real tashkilot tarmoqlarini ruxsatsiz skan qilmang.
  • Labda ishlang: VirtualBox “Host-only/Internal”.
  • Har skan maqsadini yozib boring (qaysi IP, nima uchun, natija).

SSH 0 dan

SSH — masofadan xavfsiz terminal ulanish protokoli (odatda 22‑port). Ulanish:

ssh user@192.168.1.10
ssh -p 2222 user@192.168.1.10

Kalit (key) bilan ulanish

ssh-keygen -t ed25519
ssh-copy-id user@192.168.1.10   # Linux server bo‘lsa
# key: ~/.ssh/id_ed25519
# server: ~/.ssh/authorized_keys

Nmap 0 dan: tarmoq audit (ruxsat bilan)

Nmap — tarmoqdagi hostlar va portlarni tekshirish uchun asbob. Uni faqat o‘zingizga tegishli labda yoki ruxsat berilgan tarmoqda ishlating.

Host discovery

nmap -sn 192.168.1.0/24   # faqat ping sweep
nmap -Pn 192.168.1.10     # pingni o‘tkazib yuboradi (host up deb oladi)

Port scanning

nmap 192.168.1.10         # default (top portlar)
nmap -p 80 192.168.1.10    # bitta port
nmap -p 1-1000 192.168.1.10
nmap -p- 192.168.1.10      # barcha 65535 port

Servis va OS aniqlash

nmap -sV 192.168.1.10      # servis versiya
nmap -O 192.168.1.10       # OS fingerprint (aniqlik 100% emas)
nmap -A 192.168.1.10       # agressive: -sV -O + traceroute + default scripts

Tezlik va timing

nmap -T3 192.168.1.10      # defaultga yaqin
nmap -T4 192.168.1.10      # tezroq (shovqin ko‘proq bo‘lishi mumkin)

Natijani saqlash

nmap -oN natija.txt 192.168.1.10
nmap -oX natija.xml 192.168.1.10

NSE skriptlar (xavfsiz audit)

nmap --script=default 192.168.1.10
nmap --script=safe 192.168.1.10
nmap --script=http-title -p 80,443 192.168.1.10
Maslahat: Katta tarmoqni skan qilishdan oldin doimo scope va ruxsatni tekshiring.