Parrot Security OS 4.2.2 Released With Number of New Powerful Hacking Tools & Important Kernel Updates

Parrot Security OS 4.2.2 released with a number of new tools, updated for packages and bug fixes that released since the last Parrot Security OS 4.0.

This release contains various improvement in kernel and core packages and added the new security tools and updated the existing powerful tools new version.

Also, Parrot Security OS 4.2.2 imported the latest Metasploit 4.17.11 version. Wireshark 2.6, hashcat 4.2, edb-debugger 1.0 and many many other updated tools.

Parror Engineers feels that this update was challenged one because of the many important updates under the hood of a system that looks almost identical compare to the previous release.

Also, Armitage Tool was finally updated and “missing RHOSTS error” has been fixed.

Parrot Security OS 4.2.2 Karnel and Desktop Updates

In this kernel updates Parrot 4.2 started using the latest Linux 4.18 debianized kernel and Parrot fixed all the wireless-based vulnerabilities.

Also in this updates provides Firefox 62 and many other updates along with latest LibreOffice 6.1 release.

According to Parrot OS Following updates applied for kernel and core packages.

  • A new version of the Debian-Installer now powers our netinstall images and the standard Parrot images.
  • Firmware packages were updated to add broader hardware support, including wireless devices and AMD vega graphics
  • AppArmor and Firejail profiles were adjusted to offer a good compromise of security and usability for most of the desktop and CLI applications and services

If you are using any previous version of Parrot OS you can update with following commands

sudo apt update
sudo apt purge tomoyo-tools
sudo apt full-upgrade
sudo apt autoremove

You can Download the current Parrot Security OS 4.2.2 here. Also the new documentation portal can be visited here https://www.parrotsec.org/docs.

Also Read:

New BlackArch Penetration Testing Linux ISOs Released with More Hacking Tools

Priya James

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

3 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

3 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

6 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

9 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

10 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

10 hours ago