Parrot CTFs for Teams

Build cybersecurity talent.

An interactive and guided skills development platform for corporate teams looking to master offensive, defensive, and general security domains.

Parrot CTFs for Education

Empower the next generation.

Comprehensive cybersecurity education platform designed for academic institutions to prepare students for real-world challenges.

Parrot CTFs for Students

Start your cybersecurity journey.

Self-paced learning platform with hands-on labs and structured content to help you master cybersecurity skills.

Compliance-Focused Penetration Testing

NIS2 Compliance - Penetration Testing & Auditing

NIS2 Compliance

Parrot CTFs helps companies across Europe meet and maintain NIS2 compliance through trusted, transparent, and repeatable penetration testing. Get detailed audit-ready reports, real-world risk insights, and full lifecycle support.

Our NIS2 compliance solution includes:

  • Real-world risk insights
  • Full lifecycle support
  • Comprehensive penetration testing
  • Detailed audit-ready reports

Hacking Glossary

A comprehensive glossary of hacking terms and concepts.

Explore hacking terms

Hacking Cheat Sheets

A collection of cheat sheets for various hacking techniques and tools.

Hang out

Help Center

FAQs, and troubleshooting tips.

Visit Help Center

Introduction to Parrot CTFs

A guide to getting started with Parrot CTFs.

Read Guide

From the Blog
report

New release: The latest on CVE-2025-29927 – NextJS Vulnerability

21 Mar 2025, CVE-2025-29927 was made public by Next,js maintainers and this vulnerability can lead to Authentication bypass. This vulnerability is discovered by Rachid and Yasser Allam and possible to bypass authentication if they occur in middleware

View vulnerability report
Why Parrot CTFs?

Join our mission to create a safer cyber world by making cybersecurity training fun and accessible to everyone.

Get started with Parrot CTFs
Featured News

Level Up Your Active Directory Hacking: Parrot CTFs Now Hosts GOAD by Orange Cyberdefense

We’re proud to announce that Parrot CTFs now officially hosts GOADV3 developed by Orange Cyber Defense.

Read more news
Store
Free Trial

Start a free trial

Experience our enterprise solutions with a 14-day free trial.

Get started
Book Demo

Book a demo

Let us show you how Parrot CTFs can help your organization.

Book now
Products
Business

Products we offer

NIS2 Compliance

NIS2 Compliance

Parrot CTFs helps companies across Europe meet and maintain NIS2 compliance through trusted, transparent, and repeatable penetration testing. Get detailed audit-ready reports, real-world risk insights, and full lifecycle support.

Our NIS2 compliance solution includes:

  • Comprehensive penetration testing
  • Detailed audit-ready reports
  • Real-world risk insights
  • Full lifecycle support
Resources

Hacking Glossary

A comprehensive glossary of hacking terms and concepts.

Explore hacking terms

Hacking Cheat Sheets

A collection of cheat sheets for various hacking techniques and tools.

Hang out

Help Center

FAQs, and troubleshooting tips.

Visit Help Center

Introduction to Parrot CTFs

A guide to getting started with Parrot CTFs.

Read Guide

From the Blog
report

New release: The latest on CVE-2025-29927 – NextJS Vulnerability

21 Mar 2025, CVE-2025-29927 was made public by Next,js maintainers and this vulnerability can lead to Authentication bypass. This vulnerability is discovered by Rachid and Yasser Allam and possible to bypass authentication if they occur in middleware

View vulnerability report
Company
Why Parrot CTFs?

Join our mission to create a safer cyber world by making cybersecurity training fun and accessible to everyone.

Get started with Parrot CTFs
Featured News

Level Up Your Active Directory Hacking: Parrot CTFs Now Hosts GOAD by Orange Cyberdefense

We’re proud to announce that Parrot CTFs now officially hosts GOADV3 developed by Orange Cyber Defense.

Read more news
Store

Getting to know your shell

The shell is a fundamental tool for interacting with operating systems, providing a command-line interface for executing commands, running scripts, and managing system resources.

General

Fundamentals

Parrot CTFs academy course image

What is the shell?

What Is The Shell? 

A shell is a command-line interface (CLI) used to interact with the operating system. It allows users to execute commands, run scripts, and manage system resources. Shells can be used for a variety of tasks, including file manipulation, program execution, and system administration. This is where you will spend 90% of your time as an ethical hacker you will be modifying files, running hacking tools, managing compromised machines all through the CLI. 

 

There are a few different shells you may come across: 

  • Bash (Bourne Again Shell) is the most widely used shell on Unix-like systems. It offers powerful scripting capabilities and is known for its ease of use. Bash supports command history, tab completion, and job control, making it an essential tool for both beginners and advanced users.
  • PowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and scripting language. It is built on the .NET framework and is designed for system administrators and power users. PowerShell is used primarily on Windows systems but is also available for Linux and macOS.
  • CMD (Command Prompt) is the default command-line interpreter for Windows operating systems. It provides basic command-line functionality and scripting capabilities. While not as powerful as Unix-like shells, CMD is essential for performing a wide range of tasks on Windows systems.

 

By understanding and utilizing different shells, you can optimize your workflow, enhance your productivity, and improve your overall efficiency as an ethical hacker. This foundational knowledge is a critical skill in the field of cybersecurity. We will primarily focus on the bash shell as it is the most common shell used in the internet today. 

What does the Bash Shell look like? 

 

Ready to start hacking?

Join Parrot CTFs and access our hands-on hacking labs today!