Parrot OS, in addition to being available in the Security and Home editions, also uses various **Desktop Enviroments (DE)**. Each DE has its own peculiarity, but we recommend trying them out before deciding what to install.
Parrot OS, in addition to being available in the Security and Home editions, also uses various **Desktop Enviroments (DE)**. Each DE has its own peculiarity, but we recommend trying them out before deciding what to install (however, keep in mind that you can install multiple DEs on one OS).
Being basically a graphical interface through which the user can interact with the operating system, the possibilities to modify the various components of the DE are many. Each of the following DE gives the possibility to be customized according to one's tastes.
There are two ways to create a ParrotOS VM on QubesOS for now.
#### Option 1 - Create an HVM
### Option 1 - Create an HVM ###
1. Download any ParrotOS x86_x64 image you want.
1. Download any ParrotOS x86_64 image you want.
2.[Create](https://www.qubes-os.org/doc/standalones-and-hvms/#command-line) a new HVM ([Hardware-assisted Virtual Machine](https://www.qubes-os.org/doc/glossary/#hvm)).
2. Create a new HVM.
3. Start the HVM with attached CD/DVD.
...
...
@@ -15,15 +16,15 @@ There are two ways to create a ParrotOS VM on QubesOS for now.
#### Option 2 - Build a ParrotOS TemplateVM on top of a Debian TemplateVM
### Option 2 - Build a ParrotOS TemplateVM on top of a Debian TemplateVM ###
WARNING: This website cannot guarantee that any PGP key you download from the Internet is authentic. Always obtain a trusted key fingerprint via other channels, and always check any key you download against your trusted copy of the fingerprint.
**WARNING**: This documentation cannot guarantee that any PGP key you download from the Internet is authentic. Always obtain a trusted key fingerprint via other channels, and always check any key you download against your trusted copy of the fingerprint.
This step is required since by (security) default a TemplateVM do not have a direct Internet connectivity. Users understanding the risks of enabling such access can change this configuration in firewall settings for the TemplateVM.
Note: The prompt on each line indicates where each command should be entered (@dom0, @parrot, @xxxx-dvm or @debian-<X>).
*Note*: The prompt on each line indicates where each command should be entered (@dom0, @parrot, @xxxx-dvm or @debian-<X>).
1. Retrieve the official ParrotOS GPG key using a DispVM.
1. Retrieve the official ParrotOS GPG key using a [DispVM](https://www.qubes-os.org/doc/how-to-use-disposables/).
The above command should return OK In a single line.
The above command should return OK in a single line.
8. Attempt an update on the new TemplateVM
...
...
@@ -153,7 +154,8 @@ The above command should return OK In a single line.
#### (Optional)Install the penetration testing tools
#### Install the penetration testing tools (optional) ####
At this point you should have a working template and you can install the tools you need.
1. Resize the template disk image if you plan on installing the full ParrotOS distribution. For example to install parrot-tools-full you must grow the size of the VM system from 10GB to at least 20GB.
...
...
@@ -165,5 +167,5 @@ At this point you should have a working template and you can install the tools y
(Optional) Customize the template’s home directory (e.g. install your licensed copy of Burp Suite Professional)
#### Use the TemplateVM
#### Use the TemplateVM ####
The template is ready to be used. You can now spin up AppVMs based on the parrot template.