Parrot Security OS 4.2.2 Released With Number of New Powerful Hacking Tools & Important Kernel Updates

Parrot Security OS 4.2.2 released with a number of new tools, updated for packages and bug fixes that released since the last Parrot Security OS 4.0.

This release contains various improvement in kernel and core packages and added the new security tools and updated the existing powerful tools new version.

Also, Parrot Security OS 4.2.2 imported the latest Metasploit 4.17.11 version. Wireshark 2.6, hashcat 4.2, edb-debugger 1.0 and many many other updated tools.

Parror Engineers feels that this update was challenged one because of the many important updates under the hood of a system that looks almost identical compare to the previous release.

Also, Armitage Tool was finally updated and “missing RHOSTS error” has been fixed.

Parrot Security OS 4.2.2 Karnel and Desktop Updates

In this kernel updates Parrot 4.2 started using the latest Linux 4.18 debianized kernel and Parrot fixed all the wireless-based vulnerabilities.

Also in this updates provides Firefox 62 and many other updates along with latest LibreOffice 6.1 release.

According to Parrot OS Following updates applied for kernel and core packages.

  • A new version of the Debian-Installer now powers our netinstall images and the standard Parrot images.
  • Firmware packages were updated to add broader hardware support, including wireless devices and AMD vega graphics
  • AppArmor and Firejail profiles were adjusted to offer a good compromise of security and usability for most of the desktop and CLI applications and services

If you are using any previous version of Parrot OS you can update with following commands

sudo apt update
sudo apt purge tomoyo-tools
sudo apt full-upgrade
sudo apt autoremove

You can Download the current Parrot Security OS 4.2.2 here. Also the new documentation portal can be visited here https://www.parrotsec.org/docs.

Also Read:

New BlackArch Penetration Testing Linux ISOs Released with More Hacking Tools

Priya James

Recent Posts

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a…

59 minutes ago

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application websites,…

1 hour ago

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…

1 day ago

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…

1 day ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…

1 day ago

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…

2 days ago