![hack wifi using parrot security os hack wifi using parrot security os](https://i.ytimg.com/vi/HSzj-b3I1MQ/maxresdefault.jpg)
After downloading the ISO image, make a bootable media (DVD/USB flash), when you have successfully created a bootable media, insert it into a functioning DVD-drive or USB-port, then boot into it. Next, we shall dive into the installation process but before we move any further, you need to download the Live ISO image from the link below:ġ. System Requirementsīefore you hurry to download and test it, the following are the system requirements: Importantly, here is a changelog of Parrot Security OS from 3.0 to 3.1, you can look-over the list to find more about some of the few improvements and new features. You can read a full features and notable tools list from the Parrot Security OS features and tools page. It also supports development frameworks for embedded systems and many other amazing features.Programming: braces FALCON (1.0) programming language, multiple compilers and debuggers and beyond.Additionally, it also supports encryption tools such as LUKS, Truecrypt and VeraCrypt. Cryptography: comes with custom built Anti Forensic tools, interfaces for GPG and cryptsetup.Anonymity: supports Anonsurf including anonymization of entire OS, TOR and I2P anonymous networks and beyond.Digital Forensics: supports “Forensic” boot option to shun boot automounts plus many more.System Specifications: based on Debian 9, runs on a custom hardened Linux 4.5 kernel, uses MATE desktop and Lightdm display manager.
#Hack wifi using parrot security os upgrade
It is a rolling release upgrade line and comes with some impressive penetration testing operating system features and tools. It is a comprehensive, portable security lab that you can use for cloud pentesting, computer forensics, reverse engineering, hacking, cryptography and privacy/anonymity.ĭon’t Miss: 5 Best Linux Security-Oriented Distributions of 2016 Parrot Security operating system is a Debian-based Linux distribution built by Frozenbox Network for cloud oriented penetration testing.