Parrot 4.6 distribution release with a selection of security checkers

Took place distribution release Parrot 4.6, based on the Debian Testing package base and including a collection of tools for system security testing, forensic analysis and reverse engineering. For loading proposed three variants of iso images: with the MATE environment (full 3.8 GB and reduced 1.7 GB) and with the KDE desktop (1.8 GB).

The Parrot distribution is positioned as a portable lab environment for security experts and forensic scientists, focusing on tools for testing cloud systems and IoT devices. It also includes cryptographic tools and programs to provide secure access to the network, including TOR, I2P, anonsurf, gpg, tccf, zulucrypt, veracrypt, truecrypt and luks.

Parrot 4.6 distribution release with a selection of security checkers

In the new release:

  • Redesigned interface design;
  • APT provides access to repositories by default using HTTPS, including index files via https and forwarding to https mirrors (if the mirror does not support https, then a fallback to http is performed, but verification by digital signature is carried out in any case) ;
  • Linux 4.19 kernel included. Updated drivers for Broadcom and other wireless chips. Updated NVIDIA driver to branch 410. Updated to latest app releases, including new versions of airgeddon and metasploit;
  • Π’ anonsurfing, anonymous operation mode, added option to use community supported independent resolver OpenNIC instead of provider-provided DNS servers;
  • Improved support for installing snap packages, application data is now automatically reflected in the applications menu;
  • Updated the AppArmor and Firejail profiles used to run applications in isolation mode from the rest of the system;
  • Improved support for OpenVPN, including adding the corresponding plug-in to NetworkManager;
  • Included in the composition Riot, a client for the decentralized messaging system Matrix;
  • Added Cutter with a graphical add-on for reverse engineering using the radare2 toolkit.

Source: opennet.ru

Add a comment