Categories: PENTESTING

Parrot Security OS New Released with a Collection of tools for Penetration Testing and Forensic Analysis

Parrot Security Operating System is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals.

With the new release 3.9, it includes some important new features to make the system more secure and reliable.By default, it includes TOR, I2P, anonsurf, gpg, tccf, zulucrypt, veracrypt, truecrypt, luks and many other methods to ensure privacy and Anonymity.

Also Read Top 10 Penetration Testing & Ethical Hacking Linux Distributions – 2017

It has a big repository that collects a lot of amazing hacking tools for newbies and experts. Developed by FrozenBox. The first release was in June 2013. It used to use MATE as a Desktop Environment it’s based on Debian like Kali Linux.

Parrot Security OS 3.9

The most important feature is the new sandbox system, introduced to protect many applications from 0day attacks out of the box. The sandbox is based on firejail, a suid program which is very easy to configure and customize to protect many critical applications in a quick and effective way (if an application does not work as expected, customize the corresponding firejail profile to be more permissive).

It has a new set of Debian updates and a set of fix to make the system more reliable and the new Debian updates.

Actually, it is an experimental update if you have any issues with you need to check firejail profiles and their driver’s compatibility and then need to contact Parrot Security OS team so that they can be refined with Parrot Security 4.0.

In some cases this release might not work as expected, in these cases our users are invited to check their firejail profiles and their drivers compatibility, and they should contact us immediately as all the new features introduced in Parrot 3.9 will be refined and consolidated for Parrot 4.0 (sorry for the spoiler). Parret 0S Said.

Click here to Download Parrot Security OS 3.9.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…

5 hours ago

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…

6 hours ago

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…

6 hours ago

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…

6 hours ago

New Windows Zero-Day Vulnerability Let Attackers Steal Credentials From Victim’s Machine

A security researcher discovered a vulnerability in Windows theme files in the previous year, which…

6 hours ago

SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins

The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…

6 hours ago