What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any artifact
Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013.
It is a mixture of Kali Linux and Frozenbox OS, aims to give a security focused operating system.
After Kali Linux, it is the second most popular Linux distribution for ethical hacking and penetration testing.
Parrot OS can be dual booted with Windows, also we can install it on Virtualbox, VMware, Raspberry PI and Docker.
We are going to install this OS on Virtualbox and you need to have an ISO file for that. You just have to browse https://parrotlinux.org/download-security.php
Here you will find three options. For the installation on Virtualbox we will select Live+ Installer ISO.
After downloading ISO file, you need to open VirtualBox to create a VM.
Give name to your VM, set the destination folder, select type as Linux and version as Other Linux (64-bit).
You can select version as Debian (32-bit) or (64-bit) that’s entirely based upon your choice.
Select Memory size, you can choose it based upon your system’s resources.
We are going to create a virtual hard disk, select second option.
Select hard disk type as virtual box disk image.
Select storage to “Dynamically allocated” as it will only take up space it is actually using, not the entire chosen memory space.
Give location to install this VM and specify the size of the virtual hard disk. After that select “Create”
The VM has created successfully.
Step 03: Select an image file and install Parrot OS
Now we must provide the path to the ISO file downloaded earlier.
Go to Storage tab and select Controller: IDE, select Empty, at the right most corner select the tiny CD icon from where you can browse the ISO file that you have downloaded on your PC.
Select the image file.
The Pre-Installation process has been completed now start the VM.
At first window there are several options showing up where you will select “Install”.
I am going to install with GTK GUI, but you can also choose Standard Installer.
Select the language of your choice.
Select your location.
Set the keyboard configuration based upon your choice.
You must specify Root user password.
Set up a non-root user account by typing full name.
Set the username for non-root user account.
Specify password for non-root user account.
Next the installer will ask you about the partitions of the disk. Select ‘Guided – use entire disk’.
Select the disk partition.
If you are needed to make separate partition, then choose from below two options otherwise choose “All files in one partition”.
Select Yes to further proceed the process.
Next it will show you all partitioning of the disk. If you don’t want to make further changes in partition, then select “Finish partitioning and write changes to disk.
The installation will start and after that it will ask to install GRUB boot loader. Select Yes to continue.
Specify the drive where you want to install GRUB.
This message shows up when the installation will be completed, press continue.
Your Parrot Security OS is all set to use. Enter your login credentials to proceed.
And here you got your newly secured operating system!
You can also directly import this operating system. For that you need to download the pre-build virtual machine that can be found on its official website:https://parrotlinux.org/download-security.php
Download it from here and load it into VirtualBox.
Open the downloaded VM.
This VM is already configured you just have to import it and you will get your secured Parrot Operating System.
This sums up a complete step by step procedure of how to install the Parrot OS on VirtualBox. Installing this operating system is easy when you are running it on a virtual machine moreover importing directly the virtual appliance will let you free from doing configuration process and eventually will save your time.
Industrial Cybersecurity
September 28, 2023
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any artifact
The critical infrastructure of a country is what provides the lifeblood to its citizens. It includes everything from power plants, food supply, water systems, and
Gone are the days when phones were only used to make phone calls and send text messages; nowadays, smartphones are more akin to a pocket-sized
Want always be up to date?
By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.
Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings