Learn about Parrot Security OS
Parrot Security OS is a distribution of GNU / Linux based on Debian, developed by the Frozenbox network, focusing on penetration testing, digital investigation (Digital Forensics), reverse engineering (Reverse Engineering), hacking, confidentiality code and anonymity. It comes with some impressive and very powerful pentest / hacking tools and tools. For Parrot Security OS, visit the Parrot Security download page.
About Parrot Security OS
Parrot Security OS was first released in 2013. It has been evolving continuously and quickly. Parrot Security OS now offers many different features including some very powerful and modern hacking tools and network security. If you are a penetration tester or cyber security researcher and are looking for alternatives to Kali Linux, you should try Parrot right away.
Some other versions of Parrot
- Home - A particularly lightweight version of Parrot, designed for everyday use with all basic programs. You can also use this version to build custom pentest platforms or professional workstations, by taking advantage of all the latest Debian tools and technologies.
- Studio - For students, producers, video editors and all professionals involved in professional multimedia creation.
- ARM - A lightweight Parrot version for embedded builds of ARM boards (Rpi, Orange Pi, Pine64) and derivatives: Docker, Netinstall.
Features of Parrot Security OS
Parrot comes with the open source MATE desktop and provides a variety of tools to test including: vulnerability analysis, information acquisition, wireless testing, mining tools, database auditing , reporting tools, password hacks, etc.
Because Parrot Security OS is based on a Debian system, Kali Linux fans will find it familiar and easy to use. Parrot is also a great choice for new pentest professionals and cybersecurity researchers.
Features of Parrot Security OS include:
- System specifications: Based on Debian 9, running on custom Linux 4.5 kernel, using MATE desktop and Lightdm display manager.
- Support Forensic boot option directly to avoid auto mount when booting, plus many other things.
- In terms of anonymity, Parrot Security OS supports Anonsurf, including anonymizing the entire operating system, anonymous TOR and I2P networks, etc.
- Parrot Security OS comes with custom built Anti-forensic tools, interfaces for GPG and cryptsetup. In addition, it also supports encryption tools like LUKS, Truecrypt and VeraCrypt.
- Use the FALCON programming language (1.0), many compilers and debuggers, etc.
- Full support for .net / mono and Qt5 frameworks.
- It also supports development frameworks for embedded systems and many other great features.
Some tools for Parrot Security OS:
- I2P
- ZuluCrypt
- EtherApe
- BetterCAP
- EtterCAP
- King Phisher
- Tor Browser (Tor browser)
- Wireshark
- Xhydra
- Zenmap
- Spectrum tool
- Metasploit
System requirements:
- CPU: x86 with at least 700MHz
- Architecture: i386, amd64 (x86-64bit), 486 (legacy x86), armel and armhf
- RAM: At least 256 MB for i386 and 320 MB for amd64. Recommended 512MB.
- GPU: No need for graphics acceleration
- Hard drive: About 16GB for installation
- BOOT: Priority Legacy BIOS
Install and update Parrot Security OS
Instead of downloading the entire ISO, there is a BASH script version that turns the regular Debian Stable installation into Parrot Security OS, you can find the script here.
You can download Parrot Security OS at:
- amd64 Parrot Full - Parrot-full-1.9_amd64.iso
- i386 Parrot Full - Parrot-1.9_i386.iso
To upgrade the system, open a terminal and type the following commands:
sudo apt update sudo apt purge tomoyo-tools sudo apt full-upgrade sudo apt autoremove
You should read it
- How to install and test Parrot OS in VirtualBox
- 10 operating systems for security research preferred by hackers
- Found strange ancient parrot fossils 18 million years old
- SD-WAN security options
- Symposium on IBM Security and Security 2011
- 20+ essential Linux security commands
- Steps to enable security features on Microsoft 365
- The video of a chimpanzee surfing Instagram is as mature as the one who surprised everyone
- How to create security questions nobody can guess
- 5 ways to improve Linux user account security
- What you need to know about an information security analyst
- Learn about terminal security (endpoint security)