What is parrot os : Parrot OS Tools and All Versions Of Parrot OS

Parrot Security OS

Parrot Linux (Parrot Security, parrot OS, Parrot GNU/Linux) is a free and open source GNU/Linux distribution based on Debian Testing designed for security experts, developers, and privacy aware people. It includes a full portable laboratory for all kinds of cybersecurity operations, from pentesting to digital forensics and reverse engineering, but it also includes everything needed to develop your own software or keep your data secure.

Parrot os is mostly used by the hackers and cyber experts. It provides many tools and features to the users that are used for attack mitigation, security research, forensics, and vulnerability assessment. Parrot has multiple editions that are based upon Debian, with various desktop environments available.

History Of Parrot OS

Parrot os was developed by the Lorenzo “Palinuro” Faletra and Parrot Dev Team in 10 April 2013. It is based on Linux (Unix-like) based on Debian. It is an open source operating system. It is repository in github.com/ParrotSec. Its update method is Rolling Release.

All Versions Of Parrot OS

Date Version Code name
2013-06-10 The project was started
2013-06-17 Parrot 0.1 Pre-alpha
2013-06-22 Parrot 0.2 Pre-alpha
2013-06-30 Parrot 0.3 Pre-alpha
2013-07-10 Parrot 0.4 Pre-alpha
2013-08-22 Parrot 0.5 Alpha
2013-10-21 Parrot 0.6 Alpha
2013-11-12 Parrot 0.6.5 Alpha
2013-12-06 Parrot 0.7 Pre-beta
2014-01-12 Parrot 0.8 Beta
2014-01-24 Parrot 0.8.1 Beta
2014-03-05 Parrot 0.8.2 Beta
2014-04-17 Parrot 0.8.4 Beta
2014-06-25 Parrot 0.9 Final beta
2014-07-21 Parrot 1.0 Hydrogen
2014-09-02 Parrot 1.1 Asphalt Dragon
2014-09-11 Parrot 1.2 Asphalt Dragon
2014-10-22 Parrot 1.4 JailBird
2014-11-06 Parrot 1.4.2 JailBird
2014-12-12 Parrot 1.6 JailBird
2015-02-05 Parrot 1.7 CyberLizard
2015-02-21 Parrot 1.8 CyberLizard
2015-04-04 Parrot 1.9 CyberLizard
2015-09-12 Parrot 2.0 Helium
2015-09-15 Parrot 2.0.1 Helium
2015-10-06 Parrot 2.0.4 Helium
2015-10-17 Parrot 2.0.5 Helium
2016-01-16 Parrot 2.1 Murdock
2016-02-25 Parrot 2.2 Glitch
2016-06-18 Parrot 3.0 Lithium
2016-07-26 Parrot 3.1 Defcon
2016-10-15 Parrot 3.2 CyberSloop
2016-12-25 Parrot 3.3 CyberBrig
2017-01-01 Parrot 3.4 CyberFrigate
2017-01-02 Parrot 3.4.1 CyberFrigate
2017-03-08 Parrot 3.5 CyberGalleon
2017-05-18 Parrot 3.6 JollyRoger
2017-07-09 Parrot 3.7 JollyRoger
2017-09-12 Parrot 3.8 JollyRoger
2017-10-15 Parrot 3.9 Intruder
2017-12-15 Parrot 3.10 Intruder
2018-01-29 Parrot 3.11 Intruder
2018-05-21 Parrot 4.0 stable
2018-06-04 Parrot 4.1 stable
2018-09-11 Parrot 4.22 stable
2018-11-03 Parrot 4.3 stable
2018-11-25 Parrot 4.4 stable
2019-01-21 Parrot 4.5 stable
2019-01-27 Parrot 4.5.1 stable
2019-04-26 Parrot 4.6 stable
2019-09-18 Parrot 4.7 stable
2020-03-20 Parrot 4.8 stable
2020-04-30 Parrot 4.9 stable
2020-08-16 Parrot 4.10 stable
2021-03-28 Parrot 4.11 stable

Source:  All Versions Of Parrot OS.

Parrot OS Tools

In parrot os there are many tools which are specially designed for Security Researchers and are related to penetration testing. It contains everything that Security researchers, security developers or privacy aware people might need. Some tools are given below, these are very useful for everyone-

1. AnonSurf

Anonsurf is a tool that will help you stay anonymous by routing every packet through TOR relay. When you use Anonsurf for ethical hacking, all the traffic from your system goes through a TOR proxy server due to which your IP address is changed.

For installing anonsurf type this command-

$ git clone https://github.com/Und3rf10w/kali-anonsurf.git

$ cd kali-anonsurf/

$ ./installer.sh

For run anonsurf type this command-

$sudo anonsurf start

2. Kayak – The Car Hacking Tool

Parrot Security OS has a whole menu devoted for Automotive Pentesting tools, kayak is one of these amazing tools. It is a GUI tool based on Java to analyze CAN traffic. It has some cool modern features, such as GPS tracking, recording and playback capabilities.

3. EtherApe

EtherApe is a graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display.
It supports Ethernet, FDDI, Token Ring, ISDN, PPP, SLIP and WLAN devices, plus several encapsulation formats. It can filter traffic to be shown, and can read packets from a file as well as live from the network.
Node statistics can be exported.

To download EtherApe

https://gitlab.com/rghetta/etherape

4. GPA – GNU Privacy Assistant

GnuPG is a hybrid-encryption software program because it uses a combination of conventional symmetric-key cryptography for speed, and public-key cryptography for ease of secure key exchange, typically by using the recipient’s public key to encrypt a session key which is used only once.

GnuPG was initially developed by Werner Koch. The first production version, version 1.0.0, was released on September 7, 1999. On February 7, 2014, a GnuPG crowdfunding effort closed, raising €36,732 for a new Website and infrastructure improvements.

5. Ricochet

Ricochet uses the Tor network to reach your contacts without relying on messaging servers. It creates a hidden service, which is used to rendezvous with your contacts without revealing your location or IP address.

6. Nmap

Nmap (Network Mapper) is the most flexible and comprehensive tool used for port scanning and network security auditing. It is available in Parrot Security OS with Command Line and Graphical Interface which is called Zenmap. Some features of Nmap are Host discovery, Port scanning, Version detection, TCP/IP stack fingerprinting, Scriptable interaction with the target.

7. Nikto

Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.

8. SQLMap

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

9. Crunch

Crunch is a word list generator where you can specify a standard character set or a character set you specify. Crunch can generate all possible combinations and permutations. It generates word lists in both combination and permutation ways. It can break up output by number of lines or file size.

10. CUPP

CUPP is a powerful tool for generating a wordlist for brute force attacks. It’s written in Python and hence cross-compatible with almost any platform capable of running Python scripts. To run, CUPP needs data about the target (their name, wife’s name, pet’s name, phone number, and so on), and it then generates passwords based on the keywords entered.

11. Metasploit Framework

Metasploit is a famous penetration testing and exploitation framework which is used to test for security vulnerabilities. It is built in Ruby language and supports Postgresql database for data management. It is has msfvenom which is used for exploit code generation and encoders to evade payload from antivirus solutions. To try Metasploit, type.

Use Command-

$ sudo msfconsole

12. Bleachbit

Bleachbit is a free disk space cleaner which is used to delete useless log files, internet history, cookies and temporary files. It has some advanced features like shredding files to prevent forensics and other data recovery techniques.

13. Aircrack-ng

Aircrack-ng is a suite of tools used for Wireless Security Auditing or say Wi-Fi cracking. It can be used to analyze, test, crack and attack Wireless Security Protocols like WEP, WPA, WPA2. It can be used to recover forgotten passwords.

Parrot OS Vs Kali Linux

Parrot OS and Kali is a free and open-source GNU/Linux distro which is based on Debian Testing sketched for security experts, developers, and privacy-aware people.

Parrot OS holds a full transferable arsenal for IT security and digital forensics services. Still, it also holds everything that you require for developing your programs or preserve your privacy while browsing the internet.

Simultaneously, with hundreds of pre-installed tools, you’ll get a chance to work and surf unidentified over the web. So fundamentally, we can assume that it’s a blend of Kali Linux and Frozen box OS.

Kali includes more than 600 pre-installed tools that are equipped with different data security tasks, like Penetration Testing, Security research, Computer Forensics, Web Application Testing, and Reverse Engineering. Moreover, Kali Linux is produced and managed by offensive Security, a leading and well-known information security training organization.

How To Install Parrot OS

If you are a linux user or linux lover then here i will explain how to install parrot os in your system-

If you want to install parrot os then follow these steps.

Step 1: Go to the official website of parrot “https://www.parrotsec.org“.

Step 2: Then go to the Downlod button.

Step 3: Then select the version of your computer (64bit-32bit) and downlod the OS.

Step 4: Now make your pendrive bootable and install parrot os like windows.

Now enjoy your parrot os.

Parrot OS Commands

In parrot os there are many commands for everyone’s use. Here are some common commands for parrot os-

Basic Commands:-

  • cd – to change directory(usage: cd dirname)
  • ls – list files (usage: ls /home, ls)
  • ls -la -> to list files in details
  • pwd – print working directory(usage: pwd)
  • cat – print file content (usage: cat filename)
  • more – It also print file content (usage: more filename)
  • cp – to copy files (usage: cp file /dir/newname)
  • mv – to move files(mv file /dir/newname
  • mkdir – create directory(usage: – mkdir hacker)
  • rm – remove file(usage: rm hacker.txt)
  • rmdir – remove directory(usage: rmdir hacker)
  • touch – create blank file (usage: touch hacker.txt)
  • whereis – show to location of file (usage: whereis cat)
  • locate – find files by name ( usage: locate ping)
  • man – very useful system commands manual ( usage: ma)

Basic network commands and utilities parrot os

  • ping
  • arp
  • telnet
  • ifconfig
  • iptables
  • netstat
  • route
  • traceroute
  • ss

Basic system commands and utilities parrot os

  • whomai
  • hostname
  • w
  • lslogin
  • sudo
  • dpkg
  • ps
  • users
  • crontab
  • less
  • more
  • apt
  • service
  • free
  • top
  • mem
  • grep
  • awk
  • find
  • lsof
  • last
  • kill
  • uname
  • watch
  • df
  • dd

 

Also read :- White house cybersecurity meeting After meeting Biden Google, Microsoft planed to spend big in cybersecurity

Also read :- OnlyFans has stated that it will no more ban porn after the user’s counterblast

 

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *