Get Started with Parrot Security OS on Your Computer [Tutorial]

preview_player
Показать описание

How to Set Up a Hacking Computer with Parrot Security

While Kali Linux is the go-to OS for beginners interesting in penetration testing or hacking, Parrot Security OS is a comparable alternative for those looking for a change. On this episode of Cyber Weapons Lab, we'll show you how to download, install, and run Parrot Security on any computer via a virtual machine.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

let's be honest here parrot os is the best-looking hacking os out there I mean kali is decent but needs hella good specs to run smoothly and doesn't look that nice

niko_SMC
Автор

It's great that you're posting this because this will further grow the community for ParrotOS. Looks like something I can get into and wow there are so many tools! A classmate told me about this a few months ago but I never looked into it but now I'll have to give it a try. Thank you for this very informative vid! Also, your keyboard sounds satisfying for some reason.

pewcfpv
Автор

Always liked dragons more than parrots TBH but this OS is killer. Also I love the way you mercilessly slap the life out of your keyboard

jannmoon
Автор

please make a complete tutorial on parrot security os, we couldn't find the solution anywhere else.

Bijay_GT
Автор

You can run sudo parrot-upgrade for a complete upgrade. Also, the parrot repository is much better than kali.

ritabandas
Автор

3:30 Highly highly recommend going all the way, here. If an attacker compromised the web server, they could offer up a corrupted ISO, and the hashes for the corrupted ISO. Unauthenticated hashes are only good for validating that your download wasn't corrupted, and as the first stepping stone to verifying the PGP/GPG signature.

With a large download like an ISO, they will put up a file of the various unauthenticated hashes, and then sign that file. So you download the ISO, the hashes file, validate the download using your favorite hash, and then validate the hashes file.

praecorloth
Автор

If you have a spare laptop to dedicate to security testing, parrot OS is awesome. It's more daily-driver friendly than Kali, and the install process includes hard drive zeroizing and encryption. It has mostly the same list of tools as Kali, and it's better at separating privileges. I run mine on a thinkpad x230, so it doesn't take a lot to get it running smooth.

diggacha
Автор

using parrot OS since watching your pixie dust attack using bully reaver & acquiring handshake using airgeddon videos, also ettercap, i actually installed both kali and parrot but i liked the parrot interface more and since most things that u featured on using kali also ran on parrot why not . hoping you will upload more videos on more powerfull tools

_random_guy
Автор

Checking the hash values in windows terminal: certUtil -hashfile pathFiletochek

FloRder
Автор

Yes! Finally, support for our beloved parrot!

TalesGrimm
Автор

I love Parrot as it runs well on a 2gig 1.8ghz dual core laptop from 2007

circuitsandcigars
Автор

8:30 <- Getting started with Parrot OS starts here.
If you don't need to be walked through how downloads, checksums, torrenting, VirtualBox, and linux installations, or, Linux installations and installers work on a virtual image, that timestamp is the first appearance of Parrot OS booted

soulife
Автор

@2:36
I do not understand why we should trust the hash value, when that value is on the same website as the .iso file to be downloaded?
If the web site has been compromised, then I would think that if the attacker provides a link to a counterfit .iso file, then that attacker would also provide a hash that matches his counterfeit .iso file?

The safest way I know of, to ensure that you have downloaded the genuine .iso file, is to download the .iso file from multiple mirrors, and run "fc" (Windows) or "diff" (Linux) to compare the files. Or run your favorite hash algorithm on two or three .iso files that came from different mirrors. If they all match, then you should be in good shape, as long as all of the mirrors have not been compromised, or all of the links to all of the mirrors have not been compromised.

Is there a site that maintains hash values for files?
I would feel much better getting the hash value from a site that is different from the .iso file (as well as not not having a single site directing me to both the .iso file and the hash value).

I would even accept a youtube video where a known representative from the distribution team would reveal the hash from the corresponding .iso file.

Am I missing a step that would allow me to trust a single site for both the .iso file and its hash value?


Thank you.

NoEggu
Автор

Who needs Udemy Courses when we have Kody - The Rockstar ! Much Love! Keep doing God's Work ! Thank you !

blubt
Автор

Kali's Garuda Gaming..👑🎨👑
Plus blur effect ❤️❤️

abdulshah
Автор

Another vote for more Parrot OS tutorials Thanks for all the great videos

paulmorrey
Автор

This is the prettiest GUI I have ever seen….and the OS is flat badass

B-Th-Change
Автор

imagine being this guy's neighbor. LOL. rip

abhisheksathe
Автор

great video with systematic steps which are clear and correct.
you should do a crash course for Ethical Hacking with Parrot OS

ps.morrison
Автор

Wow friend, you literally don't blink. Thank you very much for the video!

rogrp