Parrot Security OS 4.2.2 Released With Number of New Powerful Hacking Tools & Important Kernel Updates

Haythem Elmir

Parrot Security OS 4.2.2 released with a number of new tools, updated for packages and bug fixes that released since the last Parrot Security OS 4.0.

This release contains various improvement in kernel and core packages and added the new security tools and updated the existing powerful tools new version.

Also, Parrot Security OS 4.2.2 imported the latest Metasploit 4.17.11 version. Wireshark 2.6, hashcat 4.2, edb-debugger 1.0 and many many other updated tools.

Parror Engineers feels that this update was challenged one because of the many important updates under the hood of a system that looks almost identical compare to the previous release.

Parrot Security OS 4.2.2 Karnel and Desktop Updates

In this kernel updates Parrot 4.2 started using the latest Linux 4.18 debianized kernel and Parrot fixed all the wireless-based vulnerabilities.

Also in this updates provides Firefox 62 and many other updates along with latestLibreOffice 6.1 release.

According to Parrot OS Following updates applied for kernel and core packages.

  • A new version of the Debian-Installer now powers our netinstall images and the standard Parrot images.
  • Firmware packages were updated to add broader hardware support, including wireless devices and AMD vega graphics
  • AppArmor and Firejail profiles were adjusted to offer a good compromise of security and usability for most of the desktop and CLI applications and servicesIf you are using any previous version of Parrot OS you can update with following commands
    sudo apt update
    sudo apt purge tomoyo-tools
    sudo apt full-upgrade
    sudo apt autoremove

    You can Download the current Parrot Security OS 4.2.2 hereAlso the new documentation portal can be visited here

To read the original article:

Laisser un commentaire

Next Post

Mongo Lock Attack Ransoming Deleted MongoDB Databases

An attack called Mongo Lock is targeting remotely accessible and unprotected MongoDB databases, wiping them, and then demanding a ransom in order to get the contents back. While this new campaign is using a name to identify itself, these types of attacks are not new and MongoDB databases have been targeted for a […]