Commit 9bcde076 authored by Lorenzo Faletra's avatar Lorenzo Faletra

create jekyll website and import wordpress posts

parents
_site
.sass-cache
.jekyll-metadata
---
layout: default
---
<style type="text/css" media="screen">
.container {
margin: 10px auto;
max-width: 600px;
text-align: center;
}
h1 {
margin: 30px 0;
font-size: 4em;
line-height: 1;
letter-spacing: -1px;
}
</style>
<div class="container">
<h1>404</h1>
<p><strong>Page not found :(</strong></p>
<p>The requested page could not be found.</p>
</div>
source "https://rubygems.org"
# Hello! This is where you manage which Jekyll version is used to run.
# When you want to use a different version, change it below, save the
# file and run `bundle install`. Run Jekyll with `bundle exec`, like so:
#
# bundle exec jekyll serve
#
# This will help ensure the proper Jekyll version is running.
# Happy Jekylling!
gem "jekyll", "~> 3.8.5"
# This is the default theme for new Jekyll sites. You may change this to anything you like.
gem "minima", "~> 2.0"
# If you want to use GitHub Pages, remove the "gem "jekyll"" above and
# uncomment the line below. To upgrade, run `bundle update github-pages`.
# gem "github-pages", group: :jekyll_plugins
# If you have any plugins, put them here!
group :jekyll_plugins do
gem "jekyll-feed", "~> 0.6"
end
# Windows does not include zoneinfo files, so bundle the tzinfo-data gem
gem "tzinfo-data", platforms: [:mingw, :mswin, :x64_mingw, :jruby]
# Performance-booster for watching directories on Windows
gem "wdm", "~> 0.1.0" if Gem.win_platform?
GEM
remote: https://rubygems.org/
specs:
addressable (2.5.2)
public_suffix (>= 2.0.2, < 4.0)
colorator (1.1.0)
concurrent-ruby (1.0.5)
em-websocket (0.5.1)
eventmachine (>= 0.12.9)
http_parser.rb (~> 0.6.0)
eventmachine (1.2.5)
ffi (1.9.23)
forwardable-extended (2.6.0)
http_parser.rb (0.6.0)
i18n (0.9.5)
concurrent-ruby (~> 1.0)
jekyll (3.8.5)
addressable (~> 2.4)
colorator (~> 1.0)
em-websocket (~> 0.5)
i18n (~> 0.7)
jekyll-sass-converter (~> 1.0)
jekyll-watch (~> 2.0)
kramdown (~> 1.14)
liquid (~> 4.0)
mercenary (~> 0.3.3)
pathutil (~> 0.9)
rouge (>= 1.7, < 4)
safe_yaml (~> 1.0)
jekyll-feed (0.9.3)
jekyll (~> 3.3)
jekyll-sass-converter (1.5.2)
sass (~> 3.4)
jekyll-seo-tag (2.4.0)
jekyll (~> 3.3)
jekyll-watch (2.0.0)
listen (~> 3.0)
kramdown (1.17.0)
liquid (4.0.0)
listen (3.1.5)
rb-fsevent (~> 0.9, >= 0.9.4)
rb-inotify (~> 0.9, >= 0.9.7)
ruby_dep (~> 1.2)
mercenary (0.3.6)
minima (2.4.1)
jekyll (~> 3.5)
jekyll-feed (~> 0.9)
jekyll-seo-tag (~> 2.1)
pathutil (0.16.1)
forwardable-extended (~> 2.6)
public_suffix (3.0.3)
rb-fsevent (0.10.3)
rb-inotify (0.9.10)
ffi (>= 0.5.0, < 2)
rouge (3.2.1)
ruby_dep (1.5.0)
safe_yaml (1.0.4)
sass (3.5.6)
sass-listen (~> 4.0.0)
sass-listen (4.0.0)
rb-fsevent (~> 0.9, >= 0.9.4)
rb-inotify (~> 0.9, >= 0.9.7)
PLATFORMS
ruby
DEPENDENCIES
jekyll (~> 3.8.5)
jekyll-feed (~> 0.6)
minima (~> 2.0)
tzinfo-data
BUNDLED WITH
1.16.1
# Welcome to Jekyll!
#
# This config file is meant for settings that affect your whole blog, values
# which you are expected to set up once and rarely edit after that. If you find
# yourself editing this file very often, consider using Jekyll's data files
# feature for the data you need to update frequently.
#
# For technical reasons, this file is *NOT* reloaded automatically when you use
# 'bundle exec jekyll serve'. If you change this file, please restart the server process.
# Site settings
# These are used to personalize your new site. If you look in the HTML files,
# you will see them accessed via {{ site.title }}, {{ site.email }}, and so on.
# You can create any custom variable you would like, and they will be accessible
# in the templates via {{ site.myvariable }}.
name: Parrot Project Blog
description: ""
title: Parrot Project Blog
baseurl: "https://parrotsec.org/blog"
url: https://parrotsec.org/blog
twitter_username: parrotsec
github_username: parrotsec
# Build settings
markdown: kramdown
theme: minima
plugins:
- jekyll-feed
# Exclude from processing.
# The following items will not be processed, by default. Create a custom list
# to override the default setting.
# exclude:
# - Gemfile
# - Gemfile.lock
# - node_modules
# - vendor/bundle/
# - vendor/cache/
# - vendor/gems/
# - vendor/ruby/
---
id: 6
title: Welcome aboard
date: 2016-09-03T14:33:33+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=6
permalink: /welcome-aboard/
categories:
- News
---
Hi, It&#8217;s Palinuro from parrosec here, i&#8217;m happy to announce the new blog of our project
\ No newline at end of file
---
id: 17
title: 'Parrot Development Notes #0'
date: 2016-09-04T13:37:09+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=17
permalink: /parrot-development-notes-0/
categories:
- News
---
Hi, Palinuro here.
The development of Parrot 3.2 is proceeding fast and we have many new ideas to implement, first of all we are considering to drop gtkdialog and any other tool depending on it (unfortunately penmode is one of them) as gtkdialog is no longer maintianed and it doesn&#8217;t work anymore on gtk3 systems.
We will also drop pandora&#8217;s box as it is not compatible with systemd and because bleachbit already features a ram cleaner.
Gimp and kdevelop will no longer be pre-installed in our full flavour as they are no longer required by parrot-interface-full and they are not strictly needed in a live pentesting environment, but don&#8217;t worry, you can still install them from our repository, and the development section will still have geany and qtcreator that will never leave our heart.
&nbsp;
The good news is that we are working on some car hacking stuff and we are oing to introduce some new car hacking tools and frameworks as for example kayak.
&nbsp;
For what concerns our derivative projects we will give a big boost to parrot libre (iris project) and give more space to parrot studio, but we are also considering to make a parrot derivative designed for schools (with many educational tools available) but this project is strictly related to our personal work on pushing the adoption of free(libre) software in schools and other educational structures.
&nbsp;
&nbsp;
Stay tuned and join our [IRC chat](http://chat.frozenbox.org:3989/?nick=parrot_....&channels=parrot&prompt=1) and [mailing list](http://mail.parrotsec.org/listsub) for questions and further news
\ No newline at end of file
---
id: 19
title: '[done] Pentesting Dojo in Palermo'
date: 2016-09-04T16:16:56+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=19
permalink: /pentesting-dojo-in-palermo/
categories:
- events
---
Hello everyone, we are organizing a Pentesting Dojo here in Palermo (Italy).
It is scheduled for **September 17** at [_Teatro Gregotti_, **Viale delle scienze ED.17**, Palermo.](https://www.google.it/maps/place/Teatro+Gregotti/@38.0999224,13.3423694,17z)
The event is organized by Sputnix (the GNU/Linux user group that covers Palermo and many other cities in Sicily) and we were invited to organize a free security workshop with them.
The full event program will be released soon (probably Sunday) with the list of all the scheduled talks and topics.
&nbsp;
Stay tuned!
\ No newline at end of file
---
id: 27
title: New website released
date: 2016-10-11T22:28:43+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=27
permalink: /new-website-released/
categories:
- News
---
We have recently rewritten our website from scratch, it uses the MDL (Material Design Lite) library and it is designed to correctly integrate this blog and our new wiki that was released with the new website
\ No newline at end of file
---
id: 29
title: Parrot 3.2 released
date: 2016-10-15T17:40:34+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=29
permalink: /parrot-3-2-released/
categories:
- News
- release notes
---
We have finished all the work on Parrot 3.2 and we are now proud to announce its official release.
This new version comes after a long while due to some buggy packages in the Debian Testing repository that we were forced to fix by our own (it&#8217;s about the latest GTK updates that broke the MATE interface).
We wanted this release to be just an improved version of the past release, but we were able to introduce some new interesting features, a new Linux 4.7 kernel, a more accurate set of pre-installed softwares and a more comfortable but familiar environment.
We are also happy to welcome the University of Crete as a new mirror provider, KNXSecurity for its parthnership with us and Alftel Systems ltd for having believed in our work, and our words will never be enough to say thank you to all the contributors who have spent their time to make this release as professional and functional as it was in our dreams
\ No newline at end of file
---
id: 31
title: Parrot Servers Map
date: 2016-10-20T14:06:05+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=31
permalink: /parrot-servers-map/
categories:
- tips
---
We at Parrot Security have created a map of all our mirror servers, it is not geographically precise because of the high density of servers in some areas, but it is perfect to understand how our download network is distributed around the world and what zones need to be covered by new mirrors to reduce network latency and  bandwidth costs, as many countries that don&#8217;t have solid networking infrastructures offer connection to foreign networks at a very high price, as for example in many african countries.
&nbsp;
<img class="alignnone size-large wp-image-33" src="https://blog.parrotsec.org/wp-content/uploads/mirrormap-1024x550.jpg" alt="mirrormap" width="1024" height="550" srcset="https://blog.parrotsec.org/wp-content/uploads/mirrormap-1024x550.jpg 1024w, https://blog.parrotsec.org/wp-content/uploads/mirrormap-300x161.jpg 300w, https://blog.parrotsec.org/wp-content/uploads/mirrormap-768x413.jpg 768w, https://blog.parrotsec.org/wp-content/uploads/mirrormap-830x446.jpg 830w, https://blog.parrotsec.org/wp-content/uploads/mirrormap-230x124.jpg 230w, https://blog.parrotsec.org/wp-content/uploads/mirrormap-350x188.jpg 350w, https://blog.parrotsec.org/wp-content/uploads/mirrormap-480x258.jpg 480w" sizes="(max-width: 1024px) 100vw, 1024px" />
&nbsp;
If you have a solid network infrastructure and you want to host a new mirror server to cover your area, feel free to contact us and we will give you all the info to configure it
&nbsp;
[mirrors page](https://docs.parrotsec.org/mirrors-list)
\ No newline at end of file
---
id: 39
title: How to compile a custom parrot kernel
date: 2016-10-24T00:51:16+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=39
permalink: /how-to-compile-a-custom-parrot-kernel/
categories:
- tips
---
Want to create a custom kernel by compiling the source code of the parrot linux kernel?
We have recently finished our <a href="https://docs.parrotsec.org/doku.php/compile-a-custom-kernel" target="_blank">documentation page</a> dedicated to this topic.
&nbsp;
Feel free to contact our <a href="https://docs.parrotsec.org/community" target="_blank">community</a> for further help and for some tips about the correct kernel configuration for your needs
\ No newline at end of file
---
id: 37
title: New linux 4.7.6 kernel released
date: 2016-10-24T12:45:21+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=37
permalink: /new-linux-4-7-6-kernel-released/
categories:
- News
- release notes
- security
---
Linux 4.7.6 is now our default kernel, it fixes some security bugs and comes with some improvements
&nbsp;
Upgrade your parrot system to get it
&nbsp;
Follow our <a href="https://docs.parrotsec.org/doku.php/compile-a-custom-kernel" target="_blank">documentation page</a> to learn how to download the source code and compile your custom build
\ No newline at end of file
---
id: 41
title: Ambassadors program started
date: 2016-10-25T17:11:10+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=41
permalink: /ambassadors-program-started/
categories:
- News
tags:
- ambassadors
---
We at Parrot Project have finally decided to start an Ambassadors Program to give our users the possibility to distinguish theireslves from the community and be a point of reference for other users.
&nbsp;
&nbsp;
<p style="text-align: center;">
<strong>Parrot Ambassadors</strong> are individuals<br /> who are passionate about <strong>Parrot</strong>,<br /> the <strong>cyber security</strong> world,<br /> and the <strong>software freedom</strong> in general.
</p>
<p style="text-align: center;">
<a class="urlextern" title="https://www.gnu.org/philosophy/free-sw.html" href="https://www.gnu.org/philosophy/free-sw.html" target="_blank" rel="nofollow noopener">Know what does Free Software mean for us</a>
</p>
<p style="text-align: center;">
<p style="text-align: center;">
<p style="text-align: center;">
They are a global group of volunteers who have distinguished themselves<br /> in the Parrot international or local communities for their skills and<br /> attitude to encourage others to contribute to the Parrot Project and<br /> utilize <a class="urlextern" title="https://www.gnu.org/philosophy/floss-and-foss.html" href="https://www.gnu.org/philosophy/floss-and-foss.html" target="_blank" rel="nofollow noopener">FLOSS</a> products for Cyber Security and internet freedom defense.
</p>
<p style="text-align: center;">
<p style="text-align: center;">
<p style="text-align: center;">
Not just that, Parrot Ambassadors are security educators and strives to<br /> keep the power of the Web in hands of users everywhere, they are also part<br /> of our support team by helping people with the Parrot System and the tecnologies provided with it.
</p>
<p style="text-align: center;">
<p style="text-align: center;">
<p style="text-align: center;">
Parrot Ambassadors are given the opportunity to learn new skills,<br /> earn recognition, and advance their leadership in not just the<br /> Parrot community, but in their school and local community.
</p>
<p style="text-align: center;">
<p style="text-align: center;">
<a class="btn btn-primary" href="https://docs.parrotsec.org/new-ambassador">How to be an Ambassador</a><br /> <a class="btn btn-primary" href="https://docs.parrotsec.org/ambassadors-list">List of Ambassadors</a>
</p>
<p style="text-align: center;">
\ No newline at end of file
---
id: 45
title: '[done] Open Lab in Rome &#8211; 07/11/2016'
date: 2016-10-26T13:07:12+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=45
permalink: /open-lab-in-rome-07112016/
categories:
- events
---
**Hello parrots, we are happy to announce a new event in Rome, Italy.**
**It was organized in collaboration with Roma2LUG, a Linux Users Group that gave us the possibility to meet all our users in Rome.**
**The following are the event details in Italian for those who want to join us.**
&nbsp;
&nbsp;
&nbsp;
> Se pensavate che il Roma2LUG si fosse preso una pausa dopo il Linux Day vi sbagliavate di grosso!
>
> Il Roma2LUG ha avuto modo di conoscere **Lorenzo “Palinuro” Faletra**, fondatore di [Parrot Security](http://parrotsec.org), che, di passaggio nella Capitale ed in visita al nostro evento dell’anno, si è proposto di tenere un seminario prima della sua partenza. Dopo i successi degli anni passati con i “**Roma2LUG Incontra**” siamo entusiasti di presentare “**Roma2LUG OpenLab**“, una serie di eventi, corsi e seminari dedicati al mondo dell’Informatica Libera.
>
> L’inaugurazione avrà luogo con **“parrotsec.org – Cybersecurity ‘n’ cool stuff”**, dove Lorenzo Faletra simulerà scenari di attacco reali studiando la mentalità ed adottando il punto di vista di un **pentester**, sfruttandone le tecniche e gli strumenti, al fine di mettere in sicurezza un’infrastruttura informatica.
>
> L’evento si terrà presso il **Laboratorio di Informatica della Facoltà di Ingegneria** il giorno lunedì **7 novembre** dalle ore **15:00**. La partecipazione è **assolutamente libera**.
&nbsp;
&nbsp;
<a href="http://lug.uniroma2.it/wp-content/uploads/2016/10/R2LIncontra-copia-1_modtext_2.pdf" target="_blank">Locandina PDF</a>
<a href="http://lug.uniroma2.it/2016/10/25/roma2lug-parrot-security/" target="_blank">Pagina evento</a>
&nbsp;
<img class="alignnone size-large" src="http://lug.uniroma2.it/wp-content/uploads/2016/10/R2LIncontra-copia-1_modtext_2.jpg" alt="" width="1157" height="1637" />
\ No newline at end of file
---
id: 63
title: '[done] Pentesting Course in Bari, Italy &#8211; 28/11/2016'
date: 2016-11-19T11:55:36+00:00
author: palinuro
layout: post
guid: https://blog.parrotsec.org/?p=63
permalink: /pentesting-course-in-bari-italy-28112016/
categories:
- events
---
<div class="vc_row wpb_row vc_row-fluid vc_custom_1436877382226">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner ">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<h3>
<a href="http://www.ugolopez.it/shop/in-evidenza/corso-penetration-testing/">Official Link</a>
</h3>
<h3>
<a href="http://www.ugolopez.it/wp-content/uploads/2016/11/Modulo-iscrizione-corso-Pentesting.pdf">Subscription Module</a>
</h3>
</div>
</div>
<p>
&nbsp;
</p>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<h3>
DESCRIZIONE DEL CORSO
</h3>
<p>
Il <i><b>penetration testing</b></i> è un corso pratico di valutazione della sicurezza di un sistema o di una rete che simula l’attacco di un utente malintenzionato.
</p>
<p>
L’analisi comprende più fasi ed ha come obiettivo evidenziare le debolezze della piattaforma fornendo il maggior numero di informazioni sulle vulnerabilità che ne hanno permesso l’accesso non autorizzato.
</p>
<p>
L’analisi è condotta dal punto di vista di un potenziale attaccante e consiste nello sfruttamento delle vulnerabilità rilevate al fine di ottenere più informazioni possibili per accedere indebitamente al sistema.
</p>
<p>
Tutti i problemi di sicurezza rilevati vengono quindi evidenziati assieme ad una valutazione del loro impatto nel sistema e nello scenario del business aziendale, fornendo inoltre una soluzione tecnica o proposta di migrazione e mitigazione del sistema.
</p>
<p>
Il penetration test fornisce una stima chiara sulle capacità di difesa e del livello di penetrazione raggiunto nei confronti:
</p>
<ul>
<li>
delle vulnerabilità interne al sistema;
</li>
<li>
delle vulnerabilità esterne al sistema;
</li>
<li>
della sicurezza fisica.
</li>
</ul>
<p>
Docente del corso Penetration Testing è Lorenzo Faletra, project manager ed ideatore di Parrot, distribuzione linux tra le più usate in termini di sicurezza informatica.
</p>
<p>
<strong>Il Corso Penetration Testing dà diritto al rilascio di 8 CFP per gli Ingegneri di tutte le province italiane, indipendentemente dal settore di iscrizione all’albo</strong>.