Learning ParrotOS: Kickstart simple pentesting and ethical hacking techniques using cybersecurity operating system
By Arvin Destar
()
About this ebook
As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an
Related to Learning ParrotOS
Related ebooks
Python-Powered Ethical Hacking: Building Advanced Cybersecurity Tools Rating: 0 out of 5 stars0 ratingsAdvanced Python for Cybersecurity: Techniques in Malware Analysis, Exploit Development, and Custom Tool Creation Rating: 0 out of 5 stars0 ratingsMastering Linux: From Basics to Expert Proficiency Rating: 0 out of 5 stars0 ratingsLet's Use Bash on Windows 10! The Lite version Rating: 0 out of 5 stars0 ratingsLINUX FOR NOVICES: A Beginner's Guide to Mastering the Linux Operating System (2023) Rating: 0 out of 5 stars0 ratingsBash Shell Scripting for Pentesters: Master the art of command-line exploitation and enhance your penetration testing workflows Rating: 0 out of 5 stars0 ratingsProfessional Guide to Linux System Programming: Understanding and Implementing Advanced Techniques Rating: 0 out of 5 stars0 ratingsYour System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsLinux for Beginners: How to Master the Linux Operating System and Command Line form Scratch Rating: 0 out of 5 stars0 ratingsPractical Linux Security Cookbook Rating: 0 out of 5 stars0 ratingsMastering Linux System Administration Rating: 0 out of 5 stars0 ratingsBuilding Virtual Pentesting Labs for Advanced Penetration Testing Rating: 0 out of 5 stars0 ratingsEasy Linux For Beginners Rating: 2 out of 5 stars2/5Python Web Penetration Testing Cookbook Rating: 0 out of 5 stars0 ratingsHacking with Kali Linux: A Beginner’s Guide to Cybersecurity and Penetration Testing Rating: 0 out of 5 stars0 ratingsCuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsMore Debian 8 for Beginners Rating: 0 out of 5 stars0 ratingsMicrosoft PowerShell, VBScript and JScript Bible Rating: 0 out of 5 stars0 ratingsLinux Shell Scripting: From Basics to Expert Proficiency Rating: 0 out of 5 stars0 ratingsKali Linux Penetration Testing Bible Rating: 0 out of 5 stars0 ratingsMastering Kali Linux: Practical Security and Penetration Testing Techniques Rating: 0 out of 5 stars0 ratingsPowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsGoing Text: Mastering the Command Line Rating: 4 out of 5 stars4/5Mastering Python Forensics Rating: 4 out of 5 stars4/5Basics of Python Programming: Learn Python in 30 days (Beginners approach) - 2nd Edition Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker: Reconnaissance, Vulnerability Analysis & Social Engineering Rating: 0 out of 5 stars0 ratingsMalware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity For Dummies Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5Codes and Ciphers Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Metasploit Bootcamp Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsBurners and Black Markets Rating: 0 out of 5 stars0 ratingsLearning Android Forensics Rating: 4 out of 5 stars4/5Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Deep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratings
Reviews for Learning ParrotOS
0 ratings0 reviews
Book preview
Learning ParrotOS - Arvin Destar
Learning ParrotOS
Kickstart simple pentesting and ethical hacking techniques using cybersecurity operating system
Arvin Destar
Preface
As a security pro or beginner, if you want to get up and running with ParrotOS for ethical hacking and penetration testing, this book is a must-have. It starts with an intro to ParrotOS, its unique security-oriented environment, and key components, and then moves step-by-step into hands-on exercises. You'll learn how to install and customize ParrotOS, manage user accounts, and set up critical network configurations.
It's all hands-on, with each chapter focusing on real-world tasks and popular tools like Metasploit, Burp Suite, OWASP ZAP, John the Ripper, and Aircrack-ng. You'll learn the essential pentesting techniques for assessing vulnerabilities, exploiting weaknesses, and maintaining access within hacked networks. You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own.
The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.
In this book you will learn to:
Install, configure and customize ParrrotOS for ethical hacking and pentesting tasks.
Use bash scripting to automate and streamline penetration testing workflows.
Manage files and directories using command-line tools like rsync, grep, and awk.
Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.
Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.
Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.
Perform robust password audits and recover weak credentials using John the Ripper.
Test wireless networks using Aircrack-ng in WEP and WPA protocols.
Leverage pivoting techniques across compromised networks.
Integrate automated recon and scanning for continuous network monitoring.
Prologue
Which is better, ParrotOS or Kali Linux? Back when I was just starting out in the field of ethical hacking, I wondered the same thing. While Kali Linux has long been recognized for its powerful pentesting tools, I found that ParrotOS offers a refined approach that aligns better with my needs and philosophy. At its core, ParrotOS is about security, but it also offers a lightweight, adaptable environment that is sensitive to user privacy and suitable for a variety of uses. Because it gives me more control over the available security tools and lets me work efficiently without overwhelming the system, ParrotOS was my choice.
In Learning ParrotOS,
I take you on a tour of the penetration testing landscape with the open-source operating system ParrotOS. We will provide you with a solid foundation by exploring the installation and customization of ParrotOS together. I will show you how to set up the system, manage user accounts, configure network settings, and automate tasks, all of which are essential for effective security testing. In a fun and interactive way, you will learn advanced bash scripting, scan networks, and monitor systems in real-time.
My goal in writing this book was to provide you with practical examples that you can apply right away and observe the fruits of your labor. In this course, you will learn how to use Burp Suite, OWASP ZAP, and Metasploit to intercept and modify web traffic, test for vulnerabilities, and even test wireless networks with Aircrack-ng. The goal of each chapter is to provide you with practical exercises that you can do independently, so you can transform theory into practice and obstacles into opportunities for growth. My aim is to assist you in becoming proficient with ParrotOS so that you can confidently and efficiently carry out common and essential ethical hacking tasks. When we finish this book, you will have a powerful toolbox full of techniques that will equip you to solve real-world security problems creatively and precisely.
--Arvin Destar
Copyright © 2025 by GitforGits
All rights reserved. This book is protected under copyright laws and no part of it may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without the prior written permission of the publisher. Any unauthorized reproduction, distribution, or transmission of this work may result in civil and criminal penalties and will be dealt with in the respective jurisdiction at anywhere in India, in accordance with the applicable copyright laws.
Published by: GitforGits
Publisher: Sonal Dhandre
www.gitforgits.com
Printed in India
First Printing: December 2024
Cover Design by: Kitten Publishing
For permission to use material from this book, please contact GitforGits at [email protected].
Content
Preface
GitforGits
Acknowledgement
Chapter 1: Getting Started with Parrot OS
Chapter Overview
Parrot OS Overview
Before Parrot OS
Emergence of Parrot OS
Parrot OS Among Security Professionals
Choosing Right Parrot Edition
Home Edition
Security Edition
IoT Edition
Why choose Security Edition?
Downloading Parrot OS Security Edition
Selecting a Reliable Download Mirror
Understanding Checksums
Locating Checksum File
Importing Parrot OS GPG Key
Verifying Checksum Signature
Calculating and Comparing SHA256 Checksum
Creating a Bootable USB Drive
Preparing USB Drive
Installing and Configuring Rufus
Initiating Bootable USB Creation
Booting Parrot OS Live Environment
Configuring USB Boot
Launching Live Environment
Performing Initial System Updates
Updating Package Lists and Packages
Cleaning up Unnecessary Files
Verifying Update Process
Booting Parrot OS Live Environment
Exploring Live Session Features
Desktop Environment
Navigating File Manager
Using Terminal
Accessing Preinstalled Security Tools
Exploring Anonymity and Privacy Features
Interacting with Preinstalled Applications
Web Browsers and Communication Tools
Productivity Software
Development Tools
Summary
Chapter 2: Up and Running with Parrot OS
Chapter Overview
Step-by-Step Installation
Configuring BIOS/UEFI Settings
Installing Parrot OS
Language and Keyboard Configuration
Preparing Installation
Disk Partitioning
Setting up User Accounts and System Settings
Disk Partitioning Details
Partitioning Types
Choosing Between Automatic and Manual Partitioning
Navigating the Parrot Menu
Accessing Parrot Menu
Internet
Development
Office
Security
System
Accessories
Launching Security Tools
Launching Metasploit
Using Burp Suite for Web Application Testing
Performing Network Scans with Nmap
Analyzing Traffic with Wireshark
Exploring Subcategories and Integration
Information Gathering
Vulnerability Analysis
Wireless Analysis
Exploitation Tools
Customizing Parrot Menu
Pinning Applications to Panel
Organizing Tools into Favorites
Creating Custom Categories
File Management with Caja
Caja Interface
Performing File Operations
Copying Files and Folders
Moving Files and Folders
Renaming Files and Folders
Deleting Files and Folders
Managing File Permissions
Viewing File Permissions
Changing File Permissions
Changing File Ownership
Organizing Directories
Creating New Folders
Moving Items between Directories
Using Bookmarks for Quick Access
Sorting and Filtering Files
Advanced File Operations
Batch Renaming Files
Linking Files and Folders
Compressing and Extracting Files
Managing External Devices
Mounting and Unmounting Drives
Ejecting Devices Safely
Customizing Caja Preferences
Accessing Preferences
Adjusting General Settings
Setting up Default Applications
Integrating Plugins and Extensions
Exploring Advanced Features
Previewing Files
Search and Filter
Connecting to Network Shares
Sample Program: Organizing Security Project
Terminal Navigation and Shortcuts
Basic Navigation Commands
Print Working Directory
List Directory Contents
Change Directory
Managing Files and Directories
Make Directory
Remove Directory
Copy Files and Directories
Move or Rename Files and Directories
Remove Files and Directories
Viewing and Editing Files
Concatenate and Display Files
View Files Page by Page
View Start or End of Files
Simple Text Editor
System Information Commands
System Information
Monitor Processes
Disk Space Usage
Memory Usage
Package Management with APT
Updating Package Lists
Upgrading Installed Packages
Installing New Packages
Removing Packages
Searching for Packages
Searching and Finding Files
Search Within Files
Locate Files and Directories
Quickly Find Files
Networking Commands
Configure Network Interfaces
Test Network Connectivity
Secure Shell Access
Network Statistics
Managing Permissions
Change File Permissions
Change File Ownership
Process Management
Display Current Processes
Terminate Processes
Kill by Name
Useful Shortcuts
Sample Program: Terminal Commands In-use
Enhancing Productivity with Aliases
Exploring Command History
Combining Commands with Pipes and Redirection
Managing Background Processes
Setting up Workspaces
Configuring Multiple Virtual Desktops
Accessing Workspace Settings
Adding and Removing Workspaces
Customizing Workspace Settings
Managing Workspaces
Workspace 1: Security Tools
Workspace 2: Web Browsing and Research
Workspace 3: Documentation and Reporting
Workspace 4: Miscellaneous Tasks
Summary
Chapter 3: System Configuration and Customization
Chapter Overview
Managing User Accounts and Permissions
Creating New User Account
Modifying User Account Privileges
Securing User Accounts with Proper Permissions
Installing/Removing Software with APT
Updating Package Lists
Upgrading Installed Packages
Installing New Software
Removing Unneeded Software
Cleaning Up after Removal
Removing Unnecessary Packages
Clearing Package Cache
Searching for Packages
Advanced APT Commands
Downloading Packages without Installing
Checking Broken Dependencies
Simulating an Upgrade
Configuring Network Interfaces
Setting up Wired Connection
Checking Current Status
Configuring Wired Interface
Verifying Connection
Setting up Wireless Connection
Accessing Network Manager
Connecting to a Wireless Network
Configuring VPN Settings
Installing a VPN Client
Setting up VPN Configuration
Starting VPN Connection
Verifying VPN Connection
Sample Program: Configuring Network Interfaces
Managing and Troubleshooting Connections
Automating Tasks with Cron Jobs
Getting Started with Cron
Creating Cron Script
Creating Maintenance Script
Making Script Executable
Scheduling Cron Job
Editing Crontab File
Testing Cron Job
Automating Cron Scripting for Routine Maintenance
Optimizing System Performance
Adjusting System Settings
Managing Background Services
Identifying Running Services
Disabling Unneeded Services
Optimizing Resource Allocation
Managing Swappiness
Tuning I/O Scheduler
Monitoring System Resources
Disk Cleanup and Defragmentation
Summary
Chapter 4: Mastering Command-Line Utilities
Chapter Overview
Advanced Bash Scripting
Script Structure and Functions
Testing Script
File Operations and Management
‘rsync’ for File Synchronization and Backup
Searching Through Files with ‘grep’
Processing Data with ‘awk’
Combining ‘rsync’, ‘grep’, and ‘awk’
Trying OutNetwork Tools
‘nmap’ for Network Scanning
‘wget’ for Data Downloading
‘rclone’ for Cloud Storage Synchronization
Configuring rclone
Synchronizing Files to Cloud Storage
Copying Files without Deletion
Listing Remote Files
‘curl’ for HTTP Requests
Performing Simple HTTP GET Request
Saving Output to File
curl with Different HTTP Methods
Adding Headers and Handling Cookies
Integrating Network Tools
System Monitoring and Diagnostics
Using ‘htop’ for Real-Time Monitoring
Using ‘netstat’ for Network Diagnostics
Using ‘df’ for Disk Space Monitoring
Summary
Chapter 5: Leveraging Parrot OS Security Tools
Chapter Overview
Setting up Metasploit Framework
Installing Metasploit
Configuring Metasploit
Initial Database Setup
Updating Environment Variables
Initializing Metasploit
Launching ‘msfconsole’
Navigating ‘msfconsole’ Interface
Basic Configuration and Use
Automating Routine Metasploit Tasks
Creating Resource Script
Running Resource Script
Additional Configuration Options
Using Burp Suite for Web Testing
Configuring Burp Suite as Proxy
Setting up Proxy Listener
Configuring Browser
Intercepting HTTP Requests
Enabling Interception
Analyzing Intercepted Request
Manipulating HTTP Requests
Modifying Request Parameters
Using Repeater Tool
Sample Program: Testing Web App
Automating Scans with OWASP ZAP
Configuring OWASP ZAP
Automating Scan
Password Cracking with John the Ripper
Installing John Ripper
Preparing Test Password File
Running John Ripper in Default Mode
Using Custom Wordlist
Configuring Cracking Modes
Sample Program: Auditing Passwords and Recovering Lost Credentials
Prepare Hash File
Run a Dictionary Attack
Use Incremental Mode for Unmatched Hashes
Analyze Results
Wireless Security Testing with Aircrack-ng
Setting up Wireless Interface
Capturing Wireless Traffic
Start ‘Airodump-ng’
Select a Target Network
Cracking Wireless Key with ‘Aircrack-ng’
Sample Program: Testing Wireless Network
Enable Monitor Mode
Scan for Networks
Capture Handshake
Crack the Password
Summary
Chapter 6: Conducting Network Reconnaissance
Chapter Overview
Comprehensive Network Scanning with Nmap
Basic Host Discovery
Service Version Detection
Operating System Detection and Advanced Options
Output Options Save Scan
Sample Program: Assess Complete Network
Fine-Tuning Scans
Scriptable Scanning
Packet Analysis with Wireshark
Configuring Wireshark
Installing Wireshark
Configuring Wireshark Permissions
Setting up Capture
Analyzing Captured Traffic
Identifying Suspicious Activities
Sample Program: Capturing and Analyzing Traffic
Mapping Networks with Netdiscover
Installing Netdiscover
Netdiscover in Active Mode
Netdiscover in Passive Mode
Interpreting Output
Filtering and Customizing Scan
Sample Program: Holistic Network Mapping
Gathering Information with Recon-ng
Up and Running with Recon-ng
Setting up Workspace
Adding Target Domain
Modules for Data Collection
Gathering Additional Information
Automating Recon Tasks
Reviewing and Exporting Data
Sample Program: Reconnaissance Data
Summary
Chapter 7: Exploiting Vulnerabilities with Metasploit
Chapter Overview
Identifying Exploitable