Kali Linux NetHunter for Nexus and OnePlus

The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. NetHunter supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as BadUSB MITM attacks – and is built upon the sturdy shoulders of the Kali Linux distribution and toolsets. Whether you have a Nexus 5Nexus 6Nexus 7Nexus 9, Nexus 10 or OnePlus One we’ve got you covered. Our freely downloadable images come with easy to follow installation and setup instructions to get you up and running in no time at all.

  • 802.11 Wireless Injection and AP mode support with multiple supported USB wifi cards.
  • Capable of running USB HID Keyboard attacks, much like the Teensy device is able to do.
  • Supports BadUSB MITM attacks. Plug in your Nethunter to a victim PC, and have your traffic relayed though it.
  • Contains a full Kali Linux toolset, with many tools available via a simple menu system.
  • USB Y-cable support in the Nethunter kernel – use your OTG cable while still charging your Nexus device!
  • Software Defined Radio support. Use Kali Nethunter with your HackRF to explore the wireless radio space.

NetHunter Downloads

By Offensive Security DOWNLOAD KALI NETHUNTER  

Configure and build your NetHunter image from scratch. It’s completely open-source.Kali Developer – Mati Aharoni

The Advanced HID keyboard is like a Teensy device but you can SSH to it over 3G.Penetration Tester – Sean Brown  

As an experienced penetration tester or security professional, it is imperative that you trust the tools you work with. One way to achieve this trust is by having full transparency and familiarity with the code you are running. You are free to read, investigate, and change our build scripts for the NetHunter images. All of this goodness from the house of Offensive Security and developers of Kali Linux!

HID Keyboard and ‘BadUSB’ Attacks

Our NetHunter images support programmable HID keyboard attacks, (a-la-teensy), as well as “BadUSB” network attacks, allowing an attacker to easily MITM an unsuspecting target by simply connecting their device to a computer USB port. In addition to these built in features, we’ve got a whole set of native Kali Linux tools available for use, many of which are configurable through a simple web interface.

Configuration Management

The Kali NetHunter configuration interface allows you to easily configure complex configuration files through a local web interface. This feature, together with a custom kernel that supports 802.11 wireless injection and preconfigured connect back VPN services, make the NetHunter a formidable network security tool or discrete drop box – with Kali Linux at the tip of your fingers wherever you are!

Kali NetHunter is a popular open source Android ROM penetration testing platform. The developers behind the ROM made it so it would work on Google’s older Nexus smartphones, along with older OnePlus phones and some older Samsung Galaxy phones.

  • Read more: Is Android really just Linux?

However, some enterprising users have found a way to install Kali NetHunter on most Android devices.  Keep in mind this method is very unofficial so you will be installing this program on your phone at your own risk.

Prepare your phone ahead of time

Before you download and install Kali NetHunter on your Android device, it has to be rooted with a program like SuperSu. You also have to have the BusyBox app installed from the Google Play Store. You should also have lots of free storage on your Android device available. Finally, custom ROMs like  CM12. CM12.1, and CM13 are a good thing to have ready to go as well, but are not absolutely required.

How to install Kali NetHunter

  • Once your phone is prepared, go to the Offensive Security website and download the Kali NetHunter ROM version that corresponds to your Android version on your device.

DOWNLOAD KALI NETHUNTER

  • Once that’s done, you should extract the Zip file. Then go to /data/app and install the apps present in that folder one by one.
  • Then open up your preferred root explorer app, and go to /data/data/com.offsec.nethunter/files/scripts.
  • Copy all the files and paste into /system/bin (Note: If you don’t see the folder or content in files/scripts, open NetHunter app and then close it and check again)
  • Open the Nethunter App and Go to the Kali Chroot Manager and install the “Minimal Chroot”. You can also select “Full Chroot” but this is not recommended.
  • Open Terminal Emulator or nh-terminal and choose “KALI”. This will open up Kali shell. You may be prompted to allow root permission.
  • Run the following commands in the terminal one by one: apt-get update, apt-get upgrade, apt-get dist-upgrade, apt-get install kali-linux-nethunter

Setup Metasploit In Kali NetHunter

If you really want to use Kali NetHunter to its fullest, you will also need to install the Metasploit testing tool as well. In order to do this, either run the command msfdb init, or go into the Kali Services Tab on the main Nethunter App and set it to “Start at boot”. Then to actually run Metasploit, type in the command msfconsole or open any tool which uses Metasploit.

Try the GUI tools in Kali NetHunter

While you can now use Kali NetHunter on your rooted Android device, you may want to use its GUI tools as well. If that’s the case, then you need to also install and enable a VNC viewer as well.

  • First, open Terminal and execute the command apt-get install tightvncserver in Kali Terminal
  • Then, to run VNC Server type in the command vncserver :1 -geometry 1280×720 -depth 16

You should then be able to install and open any VNC Viewer from the Google Play Store. To connect it to the Kali NetHunter GUI set it up with the following details:

  • Alias: Kali Linux
  • Password: The password you set before
  • Address: 127.0.0.1 or your Private IP
  • Port: 5901 (Depends on display i.e., for display 2, Port will be 5902 and so on)
  • Username: root

Did these methods work for you? Let us know in the comments!

Leave a Reply

Your email address will not be published. Required fields are marked *