Parrot Security OS Review – Cloud Oriented Pentesting Distribution

Update - 2017.10.13

Parrot Security OS Review – Cloud Oriented Pentesting Distribution: Parrot Security operating system is a Debian-based Linux distribution built by the community Frozen box Network for cloud-oriented penetration testing. It’s a comprehensive, portable security lab that you should utilize for cloud pentesting, computer forensics, reverse engineering, hacking, cryptography and privacy/anonymity.

Parrot Security OS is a security oriented operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography

Cloud-oriented pentesting distribution Which is Based on Debian and developed by Frozenbox network.

Parrot Security OS is a type of distro designed for the people who truly love programming. It comes with the interpreters and compilers for the most famous programming languages. Furthermore,  right click on your desktop or a file manager window and you may access a helpful drop-down menu which allows instant creation of files with custom extension divided by category. You possibly can create HTML, CSS, Javascript, PHP, Ruby, Perl, Python, Falcon information and plenty of others on the fly.

Frozenbox network has forged good relations with all “pirate crew” – a gang of time wasting pirates drinking rum on a bridge of their ship. The name Parrot is inspired by a parrot who is a captain’s shoulder – certain element in all of the cartoons about pirates.


Also Read: 

  1. Top 10 Best Laptops For Programming 
  2. Top 10 best hacking OS -All Times

You can also read the full features and notable tools list from the Parrot Security OS below

System Specs

  • Debian Jessie core
  • Custom hardened Linux 4.5 kernel
  • Rolling release upgrade line
  • MATE desktop environment
  • Lightdm Display Manager
  • Custom themes, icons and wallpapers

Cloud

  • Parrot Server Edition
  • Parrot Cloud Controller
  • Parrot VPS Service
  • Custom installation script for Debian VPS

Digital Forensics

  • “Forensic” boot option to avoid boot automounts
  • Most famous Digital Forensic tools and frameworks out of the box
  • Reliable acquisition and imaging tools
  • Top class analysis softwares
  • Evidence management and reporting tools
  • Disabled automount
  • Software blockdev write protection system

System Requirements

  • CPU: at least 1Ghz dual core cpu
  • ARCH: 32bit, 64bit and ARMhf
  • RAM: 256Mb – 512Mb suggested
  • GPU: No graphic acceleration required
  • HDD Standard: 6Gb used – 8Gb suggested
  • HDD Full: 8Gb used – 16Gb suggested
  • BOOT: Legacy bios or UEFI (testing)

Cryptography

  • Custom Anti Forensic tools
  • Custom interfaces for GPG
  • Custom interfaces for cryptsetup
  • Support for LUKS, Truecrypt and VeraCrypt
  • NUKE patch for cryptsetup LUKS disks
  • Encrypted system installation

Anonymity

  • AnonSurf
  • Entire system anonymization
  • TOR and I2P out of the box
  • DNS requests anonymization
  • “Change Identity” function for AnonSurf
  • BleachBit system cleaner
  • NoScript plugin
  • UserAgentOverrider plugin
  • Browser profile manager
  • RAM-only browser profile
  • Pandora’s Box – RAM cleaner
  • Hardened system behaviour

Programming

  • FALCON Programming Language (1.0)
  • System editor tuned for programming
  • Many compilers and debuggers available
  • Reverse Engineering Tools
  • Programming Template Files
  • Pre-installed most-used libs
  • Full Qt5 development framework
  • Full .net/mono development framework
  • Development frameworks for embedded devices

TOP FEATURED TOOLS

Privacy & Cryptography

anonsurf
tor
i2p
zulucrypt
LUKS – truecrypt – veracrypt
macchanger
proxychains

Information Gathering

penmode
nmap
geotweet
dmitry
maltego
spiderfoot

Vulnerability Assessment

inurlbr
nikto
golismero
lynis
ike-skan
openvas

Web Apps Analysis

burpsuite
zaproxy
webscarab
vega
w3af
paros

Database Analysis

sqlmap
sqlninja
hexorbase
sqlsus
bbqsql
dbpwaudit
jsql

Exploitation Tools

metasploit
armitage
social engineering toolkit
beef
inguma
websploit
termineter
shellnoob

Maintaining Access

backdoor-factory
weevely
veil-evasion
netcat, dbd and sbd
bdfproxy
nishang

Password Attacks

ophcrack
hydra
john & johnny
crunch
medusa
ncrack
pyrit

WiFi

airmode
aircrack-ng
fern wifi cracker
wifite
reaver
pixiewps
mdk3

Wireless Testing

GNU Radio
chirp
bluemaho
spooftooph
redfang
rfidiot
mfoc

Sniffing & Spoofing

wireshark
ettercap
mitmproxy
driftnet
hamster
responder

Digital Forensics

DFF
foremost
autopsy
xplico
sleuthkit
scripts4cf

Reverse Engineering

edb debugger
ollydbg
GCC & clang
flasmr
radare2
jad
javasnoop

Reporting Tools

casefile
cutycapt
dradis
magictree
pipal
recordmydesktop

Mobile Hacking

android-sdk
dex2jar
apktool

And other 700+ more

The pre-installed tools in this distro are only for a small a part of all of the tools out there in our main repository, so when you want a non-listed tool, feel free to install it via our software center (Synaptic Package Manager) included in the system.
Parrot-Tools-Full
 (installs all of the tools provided by our repository)
Parrot includes a set of meta packages to install further tools easily.

 Official webhttps://www.parrotsec.org


We hope that you’ll appreciate this distro as a lot as we did – and nonetheless are. Our tests proved it to be stable and ‘perfectly’-working  – in addition to elegant, light-weight and powerful.


Now, we will dive into the installation process on next article↓

Next Article#Click to know How To Install Parrot Security OS

In search of: parrot security os review, parrot security os, review of parrot security os

9 Total Score
Excellent!

Lightweight and highly portable OS, less than 2Gb of ISO that contains only the core system. Perfect to create your own pentesting environment.

Compsmag