You'll even learn to intercept and manipulate web traffic, automate scans, and execute controlled exploits to retrieve sensitive data and escalate privileges. The steps are clearly laid out so that you can build your confidence and skills on your own. The focus here is on giving you a solid hands-on experience with the essential tools needed for penetration testing tasks, and it's all done on ParrotOS. No matter what your interests are, whether it's network reconnaissance, automating scripts, or monitoring systems, this book has got you covered when it comes to tackling the latest security challenges.
Key Learnings
Install, configure and customize ParrrotOS for ethical hacking and pentesting tasks.
Use bash scripting to automate and streamline penetration testing workflows.
Manage files and directories using command-line tools like rsync, grep, and awk.
Utilize network scanning techniques with nmap to identify active hosts and vulnerabilities.
Analyze network traffic in real-time using tcpdump, revealing hidden threats and suspicious patterns.
Exploit web vulnerabilities by intercepting and modifying traffic with Burp Suite and OWASP ZAP.
Perform robust password audits and recover weak credentials using John the Ripper.
Test wireless networks using Aircrack-ng in WEP and WPA protocols.
Leverage pivoting techniques across compromised networks.
Integrate automated recon and scanning for continuous network monitoring.
Table of Content
Getting Started with Parrot OS
Up and Running with Parrot OS
System Configuration and Customization
Mastering Command-Line Utilities
Leveraging Parrot OS Security Tools
Conducting Network Reconnaissance
Exploiting Vulnerabilities with Metasploit
Advanced Web Application Testing
Implementing Sniffing and Tunneling