Tutorial A pentetration guide for ethical hacker parrot os

Realone
  warnning disclaimer

this post does not promote or encourage any illegal activities all contents provided by the post is meant for educational purpose

Parrot os Tutorial

in this tutorial, I'm going to talk about how to start learning ethical hacking and penetration testing (pentest) as many of my FB friends were requesting                       in the kingtech. I have also created some tutorials in English   in this opportunity, I will talk about a beginner's guide to ethical hacking and penetration testing first what you need to check   let's try to discuss about   what books or study materials do we need to study you can find many e-books on the Internet some e-books are free   one of them is about hacking so if you visit this website Amazon website 


    you will find many e-books related to hacking and pentest topics here are some of the highly recommended e-books on penetration testing Penetration Testing A Hands-On Introduction to Hacking       what I'm discussing in this tutorial is more about the practical hands-on as for the study materials, you can try to find suitable titles based on your preference, CEH or others   


  please do not hesitate to contact me should you have a problem in finding the study materials as shown here       first, regarding the tools Kali Linux is the most commonly used tool by the ethical hackers and pentesters very widely used and popular distro     besides 

Kali Linux, there are other alternatives perhaps you do not like the interface of Kali then you might like to try Parrot OS then besides Parros (btw, both are also Debian based Linux   then you can also use another distro such as BackBox     as you can see they have almost similar interface or GUI complete tools listed on Kali Linux from Information Gathering to Social Engineering tools     for 

Parros from Parros section in the Main Menu you will also see similar tools listed from Information Gathering to Reporting Tools   then for BackBox         looks like on BackBox, the tools are mixed           ah, tools are listed in the Auditing section from Information Gathering to Wireless Analysis also supports Malware Analysis as for the hacking targets you can start by downloading several targets   on Vulnhub.com one of my preferred website since it offers a lot of sample of vulnerable machines as the targets that can be hacked and exploited one thing that I like you can just search for the machine name   there are many machines that you can choose from more than 100+ of vulnerable machines to practice with (for CTF and other purposes)   QUAOAR is an example of a vulnerable machine with difficulty level of Easy or Very Easy highly recommended for a newcomer of beginner then after you are done with this machine next, you can try SEDNA a good example
Tutorial A pentetration guide for ethical hacker parrot os




 I used to give it as an example for most of my students   so you can try from the easy one up to the medium difficulty level another which is considered to be harder and advanced in-depth and has a lot of challenges       it has implemented the Docker technology   it has a more detailed scenario   several scenarios I believe exist here   you may search the original website of MYHOUSE7     if possible, try not to use the "walkthrough" in order to solve the challenges if you are still learning try to solve the provided challenges your own way but if you think that you can't solve those challenges, then you may try to look for the solutions                                           (demo on hacking basics)             tools you may use such as Netdiscover and Nmap scanner                                                                               most of the target machines are using dynamic IP addressing (DHCP) so you need to make sure that your Kali Linux/Parrot OS/BackBox is using dynamic IP addressing scheme as well so that you can find the intended machines when you can them by utilizing the tools           

          you may try to find more info based on the results of our previous scanning techniques                                                           please check your virtualization software configuration or settings to make sure that you are using the same settings on the Network Adapter usually NAT or Host-only                                                 

                        you may also use VMware Player which is free                                                                                                             again, you can select any preferred Linux security distros for your ethical hacking and penetration testing hands-on labs or exercises                      

             you may download ISO image or OVA file (for virtualization)             thanks for your kind attention comments and suggestions are most welcome   

3/related/default