Verified Commit 582d3e2c authored by Lorenzo "Palinuro" Faletra's avatar Lorenzo "Palinuro" Faletra
Browse files

Merge branch 'dev' into master

parents fbcd44af 9cf34546
......@@ -14,7 +14,7 @@ Penetration testing is a time intensive job, maintaining your toolkit shouldn't
be also. We make it easier for professionals to accomplish the important stuff
by reducing the time and effort wasted making sure their tools work.
Not sure if Parrot is for you? Check out "[Should I use Parrot?](https://docs.parrotlinux.org/intro/what-is-parrot/#should-i-use-parrot)" to be sure.
Not sure if Parrot is for you? Check out "[Should I use Parrot?](https://docs.parrotsec.org/intro/what-is-parrot/#should-i-use-parrot)" to be sure.
### What is the default live password?
......@@ -52,6 +52,28 @@ Then click on the button to update the packages list.
Click on the other button to select the upgrades and finally apply the changes.
### Security or Home edition, which one should i choose?
Parrot Home Edition and Parrot Security Edition are identical, and the only difference between them is the set of software that comes pre-installed.
Parrot OS Home Edition comes with **no** security tools, while Parrot OS Security Edition comes with all the hacking and pentest tools pre-installed.
You can install Parrot Home and install only the hacking tools you actually need, or you can install all of them at once with `sudo apt install parrot-tools-full`
You can also install Parrot Home as your primary OS and then install the Security Edition as a virtual machine to isolate your home environment form your working one.
### MATE or KDE, which one should i choose?
MATE is our primary Desktop Environment and it is what we consider to be the default one.
If you don't know which one to choose, go with the MATE edition.
KDE Plasma is another Desktop Environment with a different look and feel that you can try if the MATE edition is not for you.
We also support other desktop environments like XFCE and i3, but these are experimental and it is up to you to customize them to fit your needs.
### Why isn't $toolname installed?
We have a set of prerequisites to check before a tool makes its way into our repositories such as:
......@@ -75,11 +97,11 @@ If the answers were “Yes” we're more than glad to take your request via our
### Where can bugs be submitted?
If the bug involves a specific piece of software maintained by Parrot, then search the project on our [Dev Portal](https://nest.parrot.sh/) and open an issue.
If the bug involves a specific piece of software maintained by Parrot, then search the project on our [Dev Portal](https://nest.parrotsec.org/) and open an issue.
If the bug involves a software package that is not listed, then you should contact the maintainer of that particular software.
If you are not sure what software is involved, or if you don't know how to contact the upstream developer, then contact us on our [Community Portal](https://community.parrotlinux.org/c/development/)
If you are not sure what software is involved, or if you don't know how to contact the upstream developer, then contact us on our [Community Portal](https://community.parrotsec.org/c/development/)
### What should my sources.list look like?
......@@ -153,7 +175,7 @@ There are several and we think you should try both to really get a solid feeling
### Can I contribute to this FAQ?
Of course! The pages are written in Markdown and can be accessed [here](https://nest.parrotsec.org/parrot-organization/documentation/blob/master/docs/faq.md).
Of course! The pages are written in Markdown and can be accessed [here](https://nest.parrotsec.org/org/documentation/blob/master/docs/faq.md).
 
......
......@@ -5,84 +5,295 @@ taxonomy:
- docs
visible: true
---
## Docker
NOTE: to install docker on Parrot OS execute the following, otherwise start at __Parrotsec/Parrot-core below__
## What is Docker?
Docker is a powerful technology which alllows user to run containers universally on every platform. Docker uses template images, and its power is that user can start several instances of the template, it can destroy them and even build a custom one on top of them.
For further information, go here: [Docker Official Website](https://www.docker.com/)
#### ParrotOS/Parrot-core
> **Index**
>
> [Parrot OS On Docker](#parrot-os-on-docker)
>
> [Different Images, different flavors](#different-images-different-flavors)
>
> [Parrot Security](#parrosecsecurity)
>
> [Nmap](#parrotsectools-nmap)
>
> [Metasploit](#parrotsectools-metasploit)
>
> [Social Engineering Toolkit](#parrotsectools-set)
>
> [Beef-XSS](#parrotsectools-beef)
>
> [Bettercap](#parrotsectoos-bettercap)
>
> [SQLMap](#parrotsectools-sqlmap)
>
> [General Instructions and usage examples](#general-instructions-and-usage-examples)
**Official Parrot OS Base system without tools.**
Start a new instance
Public image from Docker Cloud
```bash
docker run -ti --rm --network host parrotsec/parrot-core
```
Local image from Dockerfile
```bash
docker run -ti --rm -network host parrot-core
```
Install/Update from Docker Cloud
## Parrot OS on Docker
Before starting with Parrot OS docker images, you'll need the docker engine first.
Start with this:
```bash
docker pull parrotsec/parrot-core
sudo apt update
sudo apt install docker.io
```
Install/Update from local Dockerfile
```bash
git clone https://dev.parrotsec.org/parrot-build/docker-images && cd docker-images
docker build -t parrot-core[:version] parrot-core
```
#### Parrotsec/Parrot
#### Different images, different flavors
**Official Parrot OS image with basic security tools.**
Parrot OS Docker images come with a vanilla image, the core of Parrot just with the basics. You can use it as a starting point for your custom containers.
-Start a new instance
Available versions and architecture for core version:
-Public image from Docker Cloud
```bash
docker run -ti --rm --network host parrotsec/parrot
```
Local image from Dockerfile
```bash
docker run -ti --rm -network host parrot
```
Install/Update from Docker Cloud
```bash
docker pull parrotsec/parrot
```
Install/Update from local Dockerfile
```bash
git clone https://dev.parrotsec.org/parrot-build/docker-images && cd docker-images
- **parrosec/core:latest** based on parrot rolling (debian testing) amd64 architecture
docker build -t parrot[:version] parrot
```
#### Parrotsec/Metasploit
- **parrosec/core:rolling-amd64** based on parrot rolling (debian testing) amd64 architecture
Parrot Security Metasploit bundle.
- **parrosec/core:rolling-i386** based on parrot rolling (debian testing) i386 architecture
Install/Update from Docker Cloud
```bash
docker pull parrotsec/metasploit
```
Install/Update from local Dockerfile
```bash
git clone https://dev.parrotsec.org/parrot-build/docker-images && cd docker-images
- **parrosec/core:lts-amd64** based on parrot lts (devuan stable) amd64 architecture
docker build -t metasploit[:version] metasploit
```
Start a new instance
- **parrosec/core:lts-i386** based on parrot lts (devuan stable) i386 architecture
- **parrosec/core:lts-arm64** based on parrot lts (devuan stable) arm64 architecture
- **parrosec/core:lts-armhf** based on parrot lts (devuan stable) armhf
Launch the container:
`docker run --rm -ti --network host -v $PWD/work:/work parrotsec/core:lts-amd64`
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
Parrot OS Docker images are also available in the following flavors:
#### parrotsec/security
This flavor contains a huge collection that can be used via command line inside a docker container. The template ships with the following metapackages:
- `parrot-pico`
- `parrot-mini`
- `parrot-tools-cloud`
Available flavors for security version:
- **parrotsec/security:latest** built over `parrotsec/core:rolling-amd64`
- **parrotsec/security:rolling** built over `parrotsec/core:rolling-amd64`
- **parrotsec/security:lts** built over `parrotsec/core:lts-amd64`
Launch the container:
`docker run --rm -ti --network host -v $PWD/work:/work parrotsec/security`
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
#### parrotsec/tools-*
An accurate selection of small docker containers with specific tools, alone or in cherry-picked collections.
Containers with shared tools are stacked on top of each other (when possible) to minimize storage waste and maximize layers reuse.
Available flavors:
##### parrotsec/tools-nmap
Based on template `parrotsec/core:rolling-amd64`, comes with the following packages:
- `nmap`
- `ncat`
- `ndiff`
- `dnsutils`
- `netcat`
- `telnet`
usage:
`docker run --rm -ti parrotsec/tools-nmap <nmap options>`
examples:
`docker run --rm -ti parrotsec/tools-nmap -F 192.168.1.1`
`docker run --rm -ti parrotsec/tools-nmap -Pn 89.36.210.176`
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
##### parrotsec/tools-metasploit
Based on template `parrotsec/tools-nmap:latest`, comes with the following packages:
- `parrot-pico`
- `metasploit-framework`
- `postgresql`
usage:
`docker run --rm -ti --network host -v $PWD/msf:/root/ parrotsec/tools-metasploit`
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
##### parrotsec/tools-set
Based on template `parrotsec/tools-metasploit:latest`, comes onboarding the package `set`
usage:
`docker run --rm -ti --network host -v $PWD/set:/root/.set parrotsec/tools-set`
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
Public image from Docker Cloud
```bash
docker run -ti --network host parrotsec/metasploit
```
Local image from Dockerfile
```bash
docker run -ti -network host metasploit
```
##### parrotsec/toos-beef
Based on template parrotsec/core:rolling-amd64, comes onboarding the package `beef-xss`
usage:
`docker run --rm --network host -ti -v $PWD/beef:/var/lib/beef-xss parrosec/tools-beef`
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
##### parrotsec/tools-bettercap
Based on template `parrotsec/core:rolling-amd64`, comes onboarding the package `bettercap`
usage:
`docker run --rm -ti parrotsec/tools-bettercap`
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
##### parrotsec/tools-sqlmap
Based on template `parrotsec/core:rolling-amd64`, comes onboarding the package `sqlmap`
usage:
`docker run --rm -ti parrotsec/tools-sqlmap <sqlmap options>`
example:
`docker run --rm -ti parrotsec/tools-sqlmap -u parrotsec.org --wizard`
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
****
## General Instructions and usage examples
*ATTENTION: every docker command needs sudo, otherwise you'll get an error similar to this:*
docker: Got permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock: Post "http://%2Fvar%2Frun%2Fdocker.sock/v1.40/containers/create": dial unix /var/run/docker.sock: connect: permission denied.
See 'docker run --help'.
- **Launch a container:**
`docker run --name pcore-1 -ti parrotsec/core`
*NOTE: the pcore-1 name is arbitrary and can be customized*
- **Stop the container:**
`docker stop pcore-1`
- **Resume a previously-stopped container:**
`docker start pcore-1`
- **Remove a container after use:**
`docker rm pcore-1`
- **List all the instantiated containers:**
`docker ps -a`
- **Start multiple containers:**
*On terminal 1* `docker run --name pentest1 -ti parrotsec/security`
*On terminal 2* `docker run --name pentest2 -ti parrotsec/security`
*On terminal 3* `docker run --name msf-listener -ti parrotsec/tools-metasploit`
- **Remove all the containers:**
`docker rm $(docker ps -qa)`
- **Start a container and automatically remove it on exit:**
`docker run --rm -ti parrotsec/core`
- **Use Volumes to share files with the host:**
*It is a good practice to not keep persistent docker containers, but to remove them on every use and make sure to save important files on a docker volume.
The following command creates a "work" folder inside the current directory and mounts it in /work inside the container.*
`docker run --rm -ti -v $PWD/work:/work parrotsec/core`
- **Use Volumes to share files across multiple containers:**
*On terminal 1* `docker run --name pentest -ti -v $PWD/work:/work parrotsec/security`
*On terminal 2* `docker run --rm --network host -v $PWD/work:/work -ti parrotsec/security`
*On terminal 3* `docker run --rm -v $PWD/work:/work -ti parrotsec/tools-metasploit`
- **Open a port from the container to the host**
Every docker container has its own network space connected to a virtual LAN, all the traffic from within the docker container will be NATted by the host computer.
If you need to expose a port to other machines outside your local computer, use the following example:
`docker run --rm -p 8080:80 -ti parrotsec/core`
NOTE: the first port is the port that will be opened on your host, and the second one is the container port to bind to.
Here a reference usage of the -p flag:
**-p <host port>:<container port>** `-p 8080:80`
**-p <host port>:<container port>/<proto>** `-p 8080:80/tcp`
**-p <address>:<host port>:<container port>** `-p 192.168.1.30:8080:80` (in case of multiple adresses on host network)
- **Use network host instead of docker NAT**
Every docker container has its own network space connected to a virtual LAN.
All the traffic from within the docker container will be NATted by the host computer.
If you need to make the docker container share the same networking space of the host machine, then use the **--network host** flag as shown below
`docker run --rm --network host -ti parrotsec/core`
NOTE 1: every port opened in the container will be opened on the host as well.
NOTE 2: you can perform packet sniffing on the host network.
NOTE 3: iptables rules applied inside the container will take effect on the host as well.
&nbsp;
[Using Parrot](https://docs.parrotlinux.org/info/start/) | [Troubleshooting](https://docs.parrotlinux.org/trbl/start/) | [Linux Beginner Guide](https://docs.parrotlinux.org/library/lbg-basics/) | [Home](https://docs.parrotlinux.org/)
# Home
For the Parrot Project homepage, visit [parrotlinux.org](https://parrotlinux.org).
For the Parrot Project homepage, visit [parrotsec.org](https://parrotsec.org).
An important part of any operating system is documentation, the technical manuals which describe the operation and use of programs. As part of its efforts to create a high-quality free operating system, the Parrot Project is making every effort to provide all of its users with proper documentation in an easily accessible form.
The documentation is a continuous work in progress, and all Parrot users are invited to contribute to the creation and translation process of this portal.
![screenshot](https://docs.parrotlinux.org/img/screenshot.png)
![screenshot](https://docs.parrotsec.org/img/screenshot.png)
&nbsp;
......
......@@ -10,7 +10,7 @@ NOTE: Currently a WIP (work in progress, some links might not work and some docu
## What is Firejail
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table.
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table and system files, and it is used to allow a program to access only the resources it needs to work in order to remove elements commonly used in system exploitation or reduce the attack surface and limit the damage caused by a successful attack even in 0day exploits are involved.<
Written in C with virtually no dependencies, the software runs on any Linux computer with a 3.x kernel version or newer. The sandbox is lightweight, the overhead is low. There are no complicated configuration files to edit, no socket connections open, no daemons running in the background. All security features are implemented directly in Linux kernel and available on any Linux computer. The program is released under GPL v2 license.
......@@ -20,7 +20,20 @@ firejail firefox
```
Firejail uses profiles to set the security protections for each of the applications executed inside of it - you can find the default profiles in /etc/firejail/application.profile. Should you require custom profiles for applications not included, or wish to modify the defaults, you may place new rules or copies of the defaults in the ~/.config/firejail/ directory. You may have multiple custom profile files for a single application, and you may share the same profile file among several applications.
If firejail does not have a profile for a particular application, it uses its restrictive system-wide default profile. This can result in the application not functioning as desired, without first creating a custom, and less restrictive profile.
If firejail does not have a profile for a particular application, it uses its restrictive system-wide default profile. This can result in the application not functioning as desired, without first creating a custom, and less restrictive profile.
## Installing Firejail
Firejail used to be pre-installed in Parrot, but in more recent versions you have to install it by yourself.
Firejail was a very effective and easy to implement sandboxing technology, but its impact in system usability was huge, and Parrot decided to adopt other sandboxing solutions (like Apparmor) and leave firejail only for the brave hearts.
Use the following commands to install Firejail
```bash
sudo apt update
sudo apt install firejail firejail-profiles
```
## Using Firejail
......@@ -225,4 +238,4 @@ See also
[Firejail GitHub project page[(https://github.com/netblue30/firejail)]
&nbsp;
[Using Parrot](https://docs.parrotlinux.org/info/start/) | [Troubleshooting](https://docs.parrotlinux.org/trbl/start/) | [Linux Beginner Guide](https://docs.parrotlinux.org/library/lbg-basics/) | [Home](https://docs.parrotlinux.org/)
\ No newline at end of file
[Using Parrot](https://docs.parrotlinux.org/info/start/) | [Troubleshooting](https://docs.parrotlinux.org/trbl/start/) | [Linux Beginner Guide](https://docs.parrotlinux.org/library/lbg-basics/) | [Home](https://docs.parrotlinux.org/)
......@@ -15,7 +15,7 @@ visible: true
&nbsp;
### If you can't find the answer here, or in our [FAQ](https://docs.parrotlinux.org/faq/) please post on the [forum](https://community.parrotsec.org/c/support/)
### If you can't find the answer here, or in our [FAQ](https://docs.parrotsec.org/faq/) please post on the [forum](https://community.parrotsec.org/c/support/)
&nbsp;
---
......@@ -24,7 +24,7 @@ If you've never used Linux we suggest you look at this course by the Linux found
</b>
NOTE: Currently a WIP (work in progress, some links might not work and some documentation is likely missing.)<br>
(looking for how to install? see [here](https://docs.parrotlinux.org/getting-started/start/))
(looking for how to install? see [here](https://docs.parrotsec.org/getting-started/start/))
### Setup and Configuration
- [System Requirements](system-requirements.md)
......@@ -71,4 +71,4 @@ Looking for Dev resources?
&nbsp;
[Using Parrot](https://docs.parrotlinux.org/info/start/) | [Troubleshooting](https://docs.parrotlinux.org/trbl/start/) | [Linux Beginner Guide](https://docs.parrotlinux.org/library/lbg-basics/) | [Home](https://docs.parrotlinux.org/)
\ No newline at end of file
[Using Parrot](https://docs.parrotlinux.org/info/start/) | [Troubleshooting](https://docs.parrotlinux.org/trbl/start/) | [Linux Beginner Guide](https://docs.parrotlinux.org/library/lbg-basics/) | [Home](https://docs.parrotlinux.org/)
......@@ -10,11 +10,11 @@ visible: true
&nbsp;
**ParrotOS** (Parrot Security, ParrotOS) is a free and open source GNU/Linux distribution based on [Debian Testing](https://www.debian.org/releases/testing/) designed for security experts, developers and privacy aware people.
**Parrot Security** (Parrot OS, Parrot) is a free and open source GNU/Linux distribution based on [Debian Testing](https://www.debian.org/releases/testing/) designed for security experts, developers and privacy aware people.
It includes a full portable arsenal for IT security and digital forensics operations, but it also includes everything you need to develop your own programs or protect your privacy while surfing the net.
The operating system ships with the MATE desktop environment preinstalled and is available in several flavors to fit your needs.
The operating system ships by default with either MATE or KDE desktop environments and is available in several flavors to fit your needs.
![macaw-poly](https://docs.parrotlinux.org/img/macaw-poly.jpg)
......@@ -28,11 +28,11 @@ The operating system ships with the MATE desktop environment preinstalled and is
### History and Team
The first public release appeared on April 10th, 2013 as the result of the work of **Lorenzo Faletra** who continues to lead development.
The first public release appeared on April 10th, 2013 as the result of the work of [**Lorenzo Faletra**](https://palinuro.dev) who continues to lead development.
Originally developed as part of Frozenbox, the effort has grown to include a community of open source developers, professional security experts, advocates of digital rights, and Linux enthusiasts from all around the globe.
Originally developed as part of Frozenbox (a community forum by the same creator of Parrot), the effort has grown to include a community of open source developers, professional security experts, advocates of digital rights, and Linux enthusiasts from all around the globe.
The project is headquartered in Palermo, Italy and it is supported by an international team of experts and enthusiasts.
The project is headquartered in Palermo, Italy and governed by Parrot Security CIC, a community interest company registered in the UK.
---
......@@ -40,18 +40,7 @@ The project is headquartered in Palermo, Italy and it is supported by an interna
The system is designed to be familiar for the security expert and easy to use for the new entry student, but it does not try to hide its internals as other general purpose distributions try to do.
**Parrot can be used as a daily system**, and it provides all the programs for the day to day tasks, including dedicated system flavors that don't ship security tools.
&nbsp;
&nbsp;
---
### Secure Sandboxed Environment
People familiar with other pentest distributions may notice that Parrot is quite unique, as **it does not allow direct root logins** for safety reasons (root can only be used with sudo), and it provides its own sandbox system by combining [Firejail](https://firejail.wordpress.com) and [AppArmor](https://wiki.ubuntu.com/AppArmor) with custom security profiles.
**Parrot can be used as a daily system**, and it provides all the programs for the day to day tasks, including a dedicated edition of the system (Parrot HOME) that don't include security tools.
&nbsp;
......@@ -84,7 +73,7 @@ In this section we will explain how different is Parrot compared to other genera
<img src="https://docs.parrotlinux.org/img/parrot.svg" width="200">
<img src="https://docs.parrotsec.org/img/parrot.svg" width="200">
### General purpose distributions
......@@ -111,13 +100,15 @@ Our goal is to allow any professional pentester to make a whole security test fr
### Secure distributions
Parrot includes its own sandbox system obtained with the combination of [Firejail](https://firejail.wordpress.com) and [AppArmor](https://wiki.ubuntu.com/AppArmor) with custom security profiles.
Parrot Security ships with custom hardening profiles and configurations for [AppArmor](https://wiki.ubuntu.com/AppArmor) and other linux hardening technologies, and takes inspiration from the success of other projects that deliver the highest level of security in the GNU/Linux scenario, like [Tails](https://tails.boum.org) and [Whonix](https://www.whonix.org) to sandbox the system and deliver a layer of security above the average.
User applications in Parrot are **protected** and **"jailed"** to limit the damages in case the system is compromised.
All this additional security comes with a cost: it is harder to adopt bad behaviors on Parrot. For instance it is not possible to log in as root with the whole desktop environment, or to start critical applications like browsers, media players or advanced document readers with unnecessary privileged permissions.
All this additional security comes with a cost: it is harder to adopt bad behaviors on Parrot. For instance **it is not possible to log in as root** with the whole desktop environment, or to start critical applications like browsers, media players or advanced document readers with unnecessary privileged permissions.
The user can still open root consoles, launch security tools with privileged permissions and use the system without limits. The only thing that changes is that all the critical user applications are now protected from very bad behaviors and common exploit techniques, or even 0days, and the damages caused by advanced exploits are very limited.
The user can still open root consoles, launch security tools with privileged permissions and use the system without limits. The only thing that changes is that all the critical user applications are now protected from very bad behaviors and common exploit techniques, and the damages caused by advanced exploits are very limited.
Additional and more aggressive sandboxing can be achieved with [Firejail](https://docs.parrotsec.org/info/firejail/)
---
......@@ -137,11 +128,12 @@ The no-automount behavior is consistent and stable, but no protection is provide
* Security Experts
* Digital forensics experts
* Engineering and IT Students
* Computer Science/Engineering Students
* Researchers
* Journalists & Hacktivists
* Wannabe Hackers
* Police officers and special security institutions
* Software developers
* Journalists, Hacktivists and Whistleblowers
* Police officers and security agencies
&nbsp;
......
......@@ -53,9 +53,8 @@ In this page we list contributors and members, past and present, who have contri
| Kratvers | Denis | Russian Community Leader <br> Forum Moderator | |
| ku3k3n | | German Community Leader <br> Forum Moderator | |
| Nico_Paul | Nico Gialluca | English Community Leader <br> Forum Moderator <br>Organizer | nico at parrotsec dot org |
| Kidklown | | English Community <br> Forum Moderator | |
| Jeff | Jeff Szydel | Facebook admin <br> System Tester | jeff at parrotsec dot org |
| Zaphod BB | | Telegram Admin <br> Forum Moderator | ptd at parrotsec dot org |
| PTD | | Telegram Admin <br> Forum Moderator | ptd at parrotsec dot org |
| mastrobirraio | Pino Matranga | Web Team Leader <br> Italian Community Leader <br> Forum Moderator | |
| LulzRose | Kurt Bruggeman | | LulzRose at riseup dot net |
| KileXt | | Forum Moderator <br> Tutorial writer | |
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment