Cloud Hacking 2.0: Build a Parrot Security OS Lab in Your Browser (Free)

The lightweight, privacy-focused alternative to Kali Linux.

🦜 Cloud Hacking 2.0: Build a Parrot Security OS Lab in Your Browser (Free)

The lightweight, privacy-focused alternative to Kali Linux.

By Anonymous SchoolTime: 15 MinsCost: Free

🚀 4 vCPU
Processor
⚡ 16GB RAM
Memory
💾 32GB
Storage

🚀 Introduction

Why buy an expensive hacking laptop when you can build a powerful one in the cloud for free?

In this guide, we will "hijack" a standard GitHub Codespace to run Parrot Security OS. By the end, you will have a full graphical desktop running inside your web browser, complete with Metasploit, Nmap, and the beautiful "Ark Dark" hacker theme.

Let’s build your battle station.

🟢 Phase 1: The Setup (Account & Repo)

We need a home for our lab.

1. Create a GitHub Account

  • Go to github.com and sign up.
  • Verify your email address (Required to use Codespaces).

2. Create Your Lab Repository

  1. Click the + icon (top right) > New repository.
  2. Repository Name: parrot-cloud-lab
  3. Description: My Cloud Hacking Station
  4. Public/Private: Choose Public (Free tier users often get better machine specs on public repos).
  5. Initialize with a README: ✅ Check this box. (Crucial step!)
  6. Click Create repository.

🟢 Phase 2: Launching the Hardware

GitHub will now lend us a virtual computer.

  1. On your new repository page, click the green Code button.
  2. Switch to the Codespaces tab.
  3. Click the ... (three dots) menu > New with options....
  4. Machine Type: Select the most powerful option available (e.g., 4-core, 16GB RAM).
  5. Click Create codespace.

Wait for the terminal to load at the bottom of the screen.

🟢 Phase 3: The Transformation (Terminal Magic)

Right now, this is a plain Ubuntu machine. We are going to wipe it and pull the official Parrot OS image.

Copy and paste these commands into the terminal:

Step 1: Pull the Parrot "Security" Image

This downloads the OS containing the full arsenal of tools.

docker pull parrotsec/security:latest

Step 2: Launch the Container

We start Parrot OS and open two ports: 5901 (for the display) and 6080 (for the web view).

docker run -it --privileged -p 5901:5901 -p 6080:6080 parrotsec/security:latest /bin/bash

⚠️ Important Change:

Your terminal prompt will change to something like root@8f3a.... You are now inside Parrot OS! Run all future commands in this new prompt.

🟢 Phase 4: Installing the GUI & Themes

The "Security" image is text-only by default. Let's install the desktop interface and the classic Parrot "Hacker" look.

Step 1: Install MATE Desktop & VNC

(This takes 2-3 minutes. If asked about keyboard layout, just press Enter).

apt update && apt install -y parrot-desktop-mate parrot-menu tightvncserver novnc dbus-x11 net-tools

Step 2: The "Soul" Command (Fixing the Look)

This copies the official Parrot configuration files (themes, colors, wallpapers) so it doesn't look like a boring grey Linux.

cp -r /etc/skel/. /root/

Step 3: Configure the VNC Startup

We tell the VNC server to launch the MATE desktop session.

mkdir -p /root/.vnc
echo "#!/bin/bash
export PULSE_SERVER=127.0.0.1
xrdb $HOME/.Xresources
mate-session &" > /root/.vnc/xstartup
chmod +x /root/.vnc/xstartup

🟢 Phase 5: Turning on the Screen

Now we set the password and turn on the monitor. We will use a resolution of 1600x900.

Step 1: Set the Password

export USER=root
mkdir -p /root/.vnc
echo "parrot" | vncpasswd -f > /root/.vnc/passwd
chmod 600 /root/.vnc/passwd

Step 2: Start the VNC Server

vncserver :1 -geometry 1600x900 -depth 24

Step 3: Start the Web Bridge (noVNC)

/usr/share/novnc/utils/launch.sh --vnc localhost:5901 --listen 6080 &

🟢 Phase 6: Accessing Your Lab

The moment of truth.

  1. Look at the bottom panel of VS Code (where the terminal is).
  2. Click the tab labeled PORTS.
  3. Find Port 6080.
  4. Hover over the "Local Address" and click the Globe Icon (Open in Browser).
  5. A new tab will open with the noVNC logo.
Credentials:
Click Connect
Password: parrot

BOOM! You are now looking at a full Parrot Security OS desktop.

🟢 Phase 7: Verifying Your Tools

Let's make sure this is a real hacking machine.

  1. Open the Terminal inside the GUI (Click the MATE Terminal icon).
  2. Check the OS: Type cat /etc/os-release. It should say "Parrot OS 6 (Lorikeet)".
  3. Test a Tool: Type msfconsole. You should see the Metasploit banner load up.
  4. Test Wireless Audit: Type sudo wifite.

⚠️ Pro Tips for Your Lab

  • The "Reset" Rule: Because this is running in Docker, if you close the browser tab, the machine effectively turns off. When you come back, you must run the Phase 5 commands again to restart the screen.
  • Saving Files: Any file you create inside the Docker container (the GUI) will vanish if you delete the Codespace. Use git to push important scripts to your repository.
  • Fullscreen: Press F11 in your browser to make the lab feel like a native operating system.

Happy Hacking! 🏴‍☠️
NextGen Digital... Welcome to WhatsApp chat
Howdy! How can we help you today?
Type here...