The major caveat is that the Arch distribution can be a bit more complicated to set-up and update compared to the Debian one.īackBox Linux is another operating system designed as an open source community project, centered around security and safety. Honorable MentionsīlackArc Linux is an Arch Linux-based penetration testing distribution that is also relatively popular with security researchers. At the end of the day, it comes down to personal preference which of the pen-testing distribution we would like to use. The major difference comes in the hardware requirements between the two: Parrot OS is evidently more light-weight and can run on a wide variety of machines, where Kali Linux needs a more robust set-up to function properly. Parrot OS has a bit more security and anonymity oriented applications, but as both distributions are Debian based, it is easy to install them on Kali Linux too. Regarding security, Parrot OS offers some tools not directly available in Kali:Ĭomparing the the two distributions, we can see that there isn't a big difference in what kind of tools are installed. Alongside that, Parrot OS requires a bit less hard disk space to install and run, saving you couple of GB of space. Funnily enough, MATE is a fork of the now unmaintained GNOME 2 project, making them soft-of siblings. Contrary to that, Kali uses GNOME, which is heavier and has higher requirements. To see what differentiates them, lets look at their hardware requirements:Īs we can see already from the start, the Parrot OS does not need Graphical Acceleration and demands less memory, because of the use of the MATE Desktop Environment. both come pre-installed with a wide arsenal of hacking toolsĪt first glance it seems that both distributions are quite similar, it is quite difficult to see what sets them apart and why choose one over the other.support for analysis and testing of embedded and Internet of Things devices.both support cloud Virtual Private Servers.based on Debian development standard, which means that it has all the Debian repositories and packages available.both systems are designed with penetration testing in mind.Comparisonįirst lets discuss the similarities between the two operating systems: Parrot OS has passed through multiple iterations- the StealthPwn and frozenboxOS, ending with the final product, that is the Parrot OS. As with Kali Linux, it comes pre-installed with hundreds of tools, and as with Kali Linux, it can be a bit overwhelming for newcomers. The Parrot Security OS is a Linux distribution, offering a nice and clean product for regular users, and in the vein of Kali, offering a powerful tool focused on security, privacy and offering a familiar environment for cyber security professionals to perform penetration testing. Luckily there are a large amount of tutorials available online, which explain how to install, configure and use Kali and the plethora of tools available. The caveat is that it is quite complicated getting started and familiarizing with all the possibilities the Kali distribution offers. Kali LinuxĪ lot can be said about Kali Linux, it is one of the most well established Linux distributions for penetration testing and sports a large variety of tools. One of the most popular of these distributions is Kali Linux, over which i have already written about here, but I would like to compare it to another distribution that has become quite prominent in pen-testing, the Parrot OS and see how they stack next to each other. It is a major hassle to install all these programs by yourself, luckily here are distributions that facilitate this. Usually this is accomplished through the use of penetration testing and the use of programs and tools, which an attacker would use. Security experts need intimate knowledge in how hackers operate, to be able to prevent any intrusions in their systems. Malicious actors, and the people who try to stop them, have to usually learn the same techniques to be able to accomplish their goals. This can't be any further from reality, as most hackers will spend hours and days on end to accomplish their tasks, usually staring at a screen, using their programs of choice. When we see these hackers use the tools of their trade, we usually see a black screen with green text flashing as fast as possible on the screen, lost in commands and bright flashing lights. For years, hackers have been the main characters of movies, books and generally have captured the imagination of regular folks.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |