Maxaad Baranaysaa Casharkaan?
Dhammaan tools-ka cybersecurity ee ugu caansan waxay ku shaqeeyaan Linux. Casharkaan wuxuu kugu barin doonaa sababta Linux ay u tahay nidaamka ugu caansan xirfadlaha amniga, sida loo dejisto Kali Linux, iyo amarka aasaasiga ah ee xirfadlaha.
📌 Waxaad baranaysaa: Sababta Linux ay u muhiim tahay, noocyada Linux-ka, sida loo rakibo Kali Linux, amarrada aasaasiga ee security, maaraynta faylasha iyo oggolaanshaha, iyo isticmaalka grep iyo text tools.
1. Sababta Linux ay u Muhiim tahay Cybersecurity
- 🆓 Bilaash iyo Furan: Linux waa open-source — aad ayey uga badan tahay Windows oo la baaraandegi karo
- 🛠️ Awood badan: Dhammaan tools-ka pen testing (Nmap, Metasploit, Wireshark, Burp Suite) waxay si fiican ugu shaqeeyaan Linux
- 📟 Terminal ku xidnaan: Xirfadlaha cybersecurity badankoodu waxay ku shaqeeyaan Terminal-ka — Linux waa fiican
- 🔐 Ammaan: Linux waa ammaan badan yahay Windows (virus-yada Linux-ku waa yaraadaan)
- 🔄 Flexible: Servers-ka adduunka 96% waxay u shaqeeyaan Linux
- 🏢 Shaqo baahida: Shirkadaha ugu badan waxay u baahan yihiin aqoonta Linux
2. Noocyada Linux-ka (Distros)
Linux wuxuu leedahay noocyo badan oo loo yaqaan "distributions" ama "distros". Halkaan waxaa ku yaal kuwa ugu caansan ee cybersecurity:
🐉 Kali Linux — Ugu Caansan ee Pen Testing
Kali Linux waa distro-ga Linux ah oo ku dhisan pen testing iyo cybersecurity. Wuxuu ku jiraa 600+ tool. Waxaa abuurtay Offensive Security.
# Sida loo dejisto Kali Linux:
# Option 1: Virtual Machine (VM) — Ugu ammaan
# - Dejiso VirtualBox ama VMware
# - Ka soo dajiso kali.org
# - Samee VM cusub oo ku rakib Kali
# Option 2: WSL2 (Windows Subsystem for Linux)
# Windows 11: Microsoft Store ka raadi "Kali Linux"
# Furi PowerShell (Admin): wsl --install -d kali-linux
# Option 3: Dual Boot
# Ku dar Linux kompyuutarkaaga Windows hortiis
# Option 4: USB bootable
# Isticmaal Balena Etcher si aad USB ugu sameyso
🦜 Parrot OS — Alternativ-ka Kali
Parrot Security OS waa mid kale oo pen testing ah, laakiin nidaamka uu u baahan yahay ayuu ka yar yahay Kali (fudud kompyuutarada duqaatay).
🐧 Ubuntu — Bilowayaasha
Haddaad bilowayste aad u cusub tahay Linux, waxaan kugula talineynaa inaad bilaabto Ubuntu. Waxaad ku dar tools-ka cybersecurity marka aad diyaar noqoto.
3. Amarrada Aasaasiga ee Linux (Security Focus)
Maaraynta Faylasha
# Hel macluumaadka faahfaahinta faylasha
ls -la # Dhammaan faylasha + oggolaanshaha
ls -lah /etc/ # Galka /etc oo faahfaahsan
# Hel faylo gaar ah
find / -name "*.conf" 2>/dev/null # Raadi files .conf ah
find /home -type f -mtime -7 # Faylasha la beddelay 7 maalmood
# Maamul faylasha
cat /etc/passwd # Isticmaalayaasha nidaamka
cat /etc/shadow # Passwords (la xirmay — root oo keliya)
cat /etc/hosts # DNS local entries
Maaraynta Oggolaanshaha (Permissions)
# Oggolaanshaha faylka
ls -la faylka.txt
# -rw-r--r-- 1 root root 1234 Apr 01 faylka.txt
# ||| ||| |||
# ||| ||| |||
# rwx r-x r-- = owner, group, others
# (Read=r, Write=w, Execute=x, None=-)
# Bedel oggolaanshaha
chmod 755 script.sh # rwxr-xr-x
chmod 600 .ssh/id_rsa # rw------- (Private key!)
chmod +x script.sh # Ku dar executable
# Bedel milkiilaha
chown user:group faylka.txt
sudo chown root:root /etc/shadow
Isticmaalayaasha iyo Kooxaha
# Hel macluumaadka isticmaaluhu
whoami # Magacaaga
id # UID, GID, kooxaha
groups # Kooxahaada
cat /etc/passwd # Dhammaan isticmaalayaasha
cat /etc/group # Dhammaan kooxaha
# Xukumo isticmaalaha (root oo keliya)
sudo su # Noqo root
su - username # Noqo isticmaale kale
passwd username # Bedel password
Hawlgalada Socda iyo Network
# Arag hawlgalada socda
ps aux # Dhammaan processes-ka
ps aux | grep python # Hel processes Python ah
top # Live process viewer
htop # Qaab aad u fiican (hadduu rakibnaado)
# Network
ifconfig # (hore) Network interfaces
ip a # (cusub) Network interfaces
ss -tulnp # Ports socda
netstat -tulnp # Ports socda (hore)
# Qabso xiriirrada
tcpdump -i eth0 # Dhammaan packets
tcpdump port 80 # HTTP packets oo keliya
Grep — Raadinta Awood leh
# Grep — raadi qoraal faylasha dhexdooda
grep "root" /etc/passwd # Hel xariiqyada "root"
grep -i "password" *.conf # Case-insensitive
grep -r "admin" /var/www/ # Raadi si dib-ugu-celin
grep -n "error" /var/log/syslog # Show line numbers
grep -v "localhost" /etc/hosts # Ka dhaaf xariiqyada "localhost"
# Pipeline — ku xidh amarrada
cat /etc/passwd | grep "bash" # Isticmaalayaasha bash isticmaalaya
ps aux | grep -i "apache" # Apache processes
4. Faylasha Muhiimka ah ee Linux (Security)
/etc/passwd — Isticmaalayaasha nidaamka (la akhrin karo)
/etc/shadow — Passwords la siriyay (root oo keliya)
/etc/hosts — DNS local
/etc/crontab — Hawlaha jadwaleysan
/var/log/auth.log — Diiwaanka galitaanka (SSH, sudo, etc.)
/var/log/syslog — Diiwaanka guud ee nidaamka
/var/log/apache2/ — Diiwaanka webserverka
~/.ssh/ — SSH keys gaarka ah
~/.bash_history — Taariikhdii amarrada terminal
💡 Bilow Virtual Machine: Haddaad cusub tahay Linux, soo daji VirtualBox oo bilaash ah oo Kali Linux ku dejiso. Tani waxay kuu oggolaynaysaa inaad si adag ugu tijaabiso bilaa khatar ah kompyuutarkaaga asalka ah.
🎉 Hambalyo! Waxaad dhammaystirtay Casharka 3aad! Hadda waxaad fahamtay sababta Linux ay u muhiim tahay iyo sida loo isticmaalo amarrada aasaasiga ah. Casharka xiga waxaad baranaysaa Information Gathering — sida loo baaro bartilmaameed si adag.