[Kernel] [Nethunter] [Android 10] [crownlte] [OneUI/LOS] [N960F] Sexynos V2.0

Search This thread
https%3A%2F%2Fexternal-content.duckduckgo.com%2Fiu%2F%3Fu%3Dhttp%253A%252F%252F4.bp.blogspot.com%252F-FtNXxWQDe2g%252FVCGxxe9noRI%252FAAAAAAAADF0%252F2H8K74p_D58%252Fs1600%252Fnethunter-banner.png%26f%3D1%26nofb%3D1


* Your warranty is now void.
*
* We're not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed. Please
* do some research if you have any concerns about features included in this Kernel
* before flashing it! YOU are choosing to make these modifications, and if
* you point the finger at us for messing up your device, we will laugh at you.


A project by Offensive Security


The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs.


About the kernel:


For AOSP/ONEUi (2 different files)

ONEUi kernel is based on Stock sources
AOSP Kernel is based on LOS sources.

Features:
* Added all the Nethunter supported wifi adapter drivers.
* Premissive
* ALl the USB functions in Arsenal Settings added

Whats not working:
* HID interface got some problems and will be fixed in future.

INSTALLATION

* Download latest Kernel from Here https://drive.google.com/file/d/1Lusn2yI2V98zkNeywjF-Jl5bItz1SnUa/view?usp=sharing
* Download latest Nethunter GenericArm64.zip from here https://images.kali.org/nethunter/nethunter-2020.3-generic-arm64-kalifs-full.zip
* Boot into recovery
* Flash nethunter-2020.3-generic-arm64-kalifs-full.zip
* Flash Nethunter-Kernel-Note9.zip
* Reflash Magisk (it has to be done even if you already have done)
* Reboot to system

Now Enjoy - fully functional Nethunter in your Galaxy Note-9


XDA:DevDB Information
Nethunter Kernel, Kernel for the Samsung Galaxy Note 9

Contributors
Thiviyan, anastasiszn
Source Code: https://gitlab.com/s133py/nethunter-kernel-note9

Kernel Special Features: All the nethunter features added (HID has bugs will be fixed in future)

Version Information
Status:
Stable
Current Stable Version: V 2.0
Stable Release Date: 2020-09-09

Created 2020-07-09
Last Updated 2020-11-09
Hello sir I have installed this kernel on dr kethan rom v15 my device is sm-n960n the phone boots up after 4 time restart worked perfectly but iam not to put tl-wn722 in monitor mode does this kernel support sm-n960n ?? Please tell me if anyone tried it on Korean variant i have been trying to make a kernel for myself that should support all nethunter functions from 4 months iam trying but i get errors everytime while compiling and adding drivers for sm-n960n if anyone can help or compile a kernel for my device i would be so great full iam struggling hard and iam newbie to these stuffs so everytime i get errors and problems and there is no solution for those errors in google that i get someone please help me or let mw know how to use this kernel for my device ..
 
https%3A%2F%2Fexternal-content.duckduckgo.com%2Fiu%2F%3Fu%3Dhttp%253A%252F%252F4.bp.blogspot.com%252F-FtNXxWQDe2g%252FVCGxxe9noRI%252FAAAAAAAADF0%252F2H8K74p_D58%252Fs1600%252Fnethunter-banner.png%26f%3D1%26nofb%3D1


* Your warranty is now void.
*
* We're not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed. Please
* do some research if you have any concerns about features included in this Kernel
* before flashing it! YOU are choosing to make these modifications, and if
* you point the finger at us for messing up your device, we will laugh at you.


A project by Offensive Security


The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs.


About the kernel:


For AOSP/ONEUi (2 different files)

ONEUi kernel is based on Stock sources
AOSP Kernel is based on LOS sources.

Features:
* Added all the Nethunter supported wifi adapter drivers.
* Premissive
* ALl the USB functions in Arsenal Settings added

Whats not working:
* HID interface got some problems and will be fixed in future.

INSTALLATION

* Download latest Kernel from Here https://drive.google.com/file/d/1Lusn2yI2V98zkNeywjF-Jl5bItz1SnUa/view?usp=sharing
* Download latest Nethunter GenericArm64.zip from here https://images.kali.org/nethunter/nethunter-2020.3-generic-arm64-kalifs-full.zip
* Boot into recovery
* Flash nethunter-2020.3-generic-arm64-kalifs-full.zip
* Flash Nethunter-Kernel-Note9.zip
* Reflash Magisk (it has to be done even if you already have done)
* Reboot to system

Now Enjoy - fully functional Nethunter in your Galaxy Note-9


XDA:DevDB Information
Nethunter Kernel, Kernel for the Samsung Galaxy Note 9

Contributors
Thiviyan, anastasiszn
Source Code: https://gitlab.com/s133py/nethunter-kernel-note9

Kernel Special Features: All the nethunter features added (HID has bugs will be fixed in future)

Version Information
Status:
Stable
Current Stable Version: V 2.0
Stable Release Date: 2020-09-09

Created 2020-07-09
Last Updated 2020-11-09
Is it still working with dr kethan rom for sm-n960n or is it only for am-n960f ??? Please let me know if anyone used it on sm-n960n dr kethan rom
 
https%3A%2F%2Fexternal-content.duckduckgo.com%2Fiu%2F%3Fu%3Dhttp%253A%252F%252F4.bp.blogspot.com%252F-FtNXxWQDe2g%252FVCGxxe9noRI%252FAAAAAAAADF0%252F2H8K74p_D58%252Fs1600%252Fnethunter-banner.png%26f%3D1%26nofb%3D1


* Your warranty is now void.
*
* We're not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed. Please
* do some research if you have any concerns about features included in this Kernel
* before flashing it! YOU are choosing to make these modifications, and if
* you point the finger at us for messing up your device, we will laugh at you.


A project by Offensive Security


The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs.


About the kernel:


For AOSP/ONEUi (2 different files)

ONEUi kernel is based on Stock sources
AOSP Kernel is based on LOS sources.

Features:
* Added all the Nethunter supported wifi adapter drivers.
* Premissive
* ALl the USB functions in Arsenal Settings added

Whats not working:
* HID interface got some problems and will be fixed in future.

INSTALLATION

* Download latest Kernel from Here https://drive.google.com/file/d/1Lusn2yI2V98zkNeywjF-Jl5bItz1SnUa/view?usp=sharing
* Download latest Nethunter GenericArm64.zip from here https://images.kali.org/nethunter/nethunter-2020.3-generic-arm64-kalifs-full.zip
* Boot into recovery
* Flash nethunter-2020.3-generic-arm64-kalifs-full.zip
* Flash Nethunter-Kernel-Note9.zip
* Reflash Magisk (it has to be done even if you already have done)
* Reboot to system

Now Enjoy - fully functional Nethunter in your Galaxy Note-9


XDA:DevDB Information
Nethunter Kernel, Kernel for the Samsung Galaxy Note 9

Contributors
Thiviyan, anastasiszn
Source Code: https://gitlab.com/s133py/nethunter-kernel-note9

Kernel Special Features: All the nethunter features added (HID has bugs will be fixed in future)

Version Information
Status:
Stable
Current Stable Version: V 2.0
Stable Release Date: 2020-09-09

Created 2020-07-09
Last Updated 2020-11-09
Am i the only one whos reply comment gets deleted and no one answer my question? 🤔
 
  • Like
Reactions: hackvice

DarrenNewsgroup

Senior Member
Apr 9, 2011
355
143
Samsung Galaxy Note 20 Ultra
https%3A%2F%2Fexternal-content.duckduckgo.com%2Fiu%2F%3Fu%3Dhttp%253A%252F%252F4.bp.blogspot.com%252F-FtNXxWQDe2g%252FVCGxxe9noRI%252FAAAAAAAADF0%252F2H8K74p_D58%252Fs1600%252Fnethunter-banner.png%26f%3D1%26nofb%3D1


* Your warranty is now void.
*
* We're not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed. Please
* do some research if you have any concerns about features included in this Kernel
* before flashing it! YOU are choosing to make these modifications, and if
* you point the finger at us for messing up your device, we will laugh at you.


A project by Offensive Security


The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs.


About the kernel:


For AOSP/ONEUi (2 different files)

ONEUi kernel is based on Stock sources
AOSP Kernel is based on LOS sources.

Features:
* Added all the Nethunter supported wifi adapter drivers.
* Premissive
* ALl the USB functions in Arsenal Settings added

Whats not working:
* HID interface got some problems and will be fixed in future.

INSTALLATION

* Download latest Kernel from Here https://drive.google.com/file/d/1Lusn2yI2V98zkNeywjF-Jl5bItz1SnUa/view?usp=sharing
* Download latest Nethunter GenericArm64.zip from here https://images.kali.org/nethunter/nethunter-2020.3-generic-arm64-kalifs-full.zip
* Boot into recovery
* Flash nethunter-2020.3-generic-arm64-kalifs-full.zip
* Flash Nethunter-Kernel-Note9.zip
* Reflash Magisk (it has to be done even if you already have done)
* Reboot to system

Now Enjoy - fully functional Nethunter in your Galaxy Note-9


XDA:DevDB Information
Nethunter Kernel, Kernel for the Samsung Galaxy Note 9

Contributors
Thiviyan, anastasiszn
Source Code: https://gitlab.com/s133py/nethunter-kernel-note9

Kernel Special Features: All the nethunter features added (HID has bugs will be fixed in future)

Version Information
Status:
Stable
Current Stable Version: V 2.0
Stable Release Date: 2020-09-09

Created 2020-07-09
Last Updated 2020-11-09
The link https://images.kali.org/nethunter/nethunter-2020.3-generic-arm64-kalifs-full.zip is not working, I get a 404 error when clicking on it. Can it be uploaded again or the link corrected?
Thanks
Darren
 

anastasiszn

Senior Member
May 3, 2012
1,211
267
36
Thessaloniki
octagonsec.gr
  • Like
Reactions: DarrenNewsgroup

DarrenNewsgroup

Senior Member
Apr 9, 2011
355
143
Samsung Galaxy Note 20 Ultra
I've got it installed now (had to switch from TWRP 3.5.2 to OrangeFox R2.0.2). I notice that the HID USB keyboard is still not working (the main NetHunter app says "HID interface not found"). Does anyone know if or when this is likely to be fixed? I know this sounds like asking for an ETA
 

anastasiszn

Senior Member
May 3, 2012
1,211
267
36
Thessaloniki
octagonsec.gr
I've got it installed now (had to switch from TWRP 3.5.2 to OrangeFox R2.0.2). I notice that the HID USB keyboard is still not working (the main NetHunter app says "HID interface not found"). Does anyone know if or when this is likely to be fixed? I know this sounds like asking for an ETA

HID not working now. Maybe we fix on future. Its not solution yet with exynos 4.9 kernel.
 
  • Like
Reactions: DarrenNewsgroup

jet_iso

Senior Member
Nov 9, 2013
144
53
Hi found kernel in my archive.
Followed the procedure but got bootloop. I could get system back via flash rom again.

Rom: Alexndr DevBase 7.4 FUF5
Kali: 2021.2 generic

Is there any update or fix for this?
 

jet_iso

Senior Member
Nov 9, 2013
144
53
You need external device.
Got it. I got CSR4 dongle.

Now I can see hci0 interface. Dbus and Bluetooth service is on. Even interface seems up but I get notified 'interface is down' when I click scan for divice button.

Is there any fix or I do something wrong?

Regards.
 

Attachments

  • 20210814_160658.jpg
    20210814_160658.jpg
    172.2 KB · Views: 128

anastasiszn

Senior Member
May 3, 2012
1,211
267
36
Thessaloniki
octagonsec.gr
Got it. I got CSR4 dongle.

Now I can see hci0 interface. Dbus and Bluetooth service is on. Even interface seems up but I get notified 'interface is down' when I click scan for divice button.

Is there any fix or I do something wrong?

Regards.
To get HCI0 working on your android phone

First enable VHCI, UART, and other drivers in Bluetooth subsystem section

Then compile and flash the kernel.

Once that's done install nethunter and it's chroot, and set up Bluetooth arsenal.

Then open a terminal and unzip this archive and run the script, it will install all required dependencies for hci0, once that's done. Run bluebinder and see if it stays tht way, if it does it means it will work and you should proceed to next step, if not you probably need to recompile the kernel with the stuffs needed.

Next step is open another terminal, run these commands

hciconfig hci0 up
hciconfig

Then feel free to try doing any Bluetooth attacks you want.



Happy Hacking :)
 

Attachments

  • bluebinder_installer.zip
    897 bytes · Views: 155

jet_iso

Senior Member
Nov 9, 2013
144
53
To get HCI0 working on your android phone

First enable VHCI, UART, and other drivers in Bluetooth subsystem section

Then compile and flash the kernel.

Once that's done install nethunter and it's chroot, and set up Bluetooth arsenal.

Then open a terminal and unzip this archive and run the script, it will install all required dependencies for hci0, once that's done. Run bluebinder and see if it stays tht way, if it does it means it will work and you should proceed to next step, if not you probably need to recompile the kernel with the stuffs needed.

Next step is open another terminal, run these commands

hciconfig hci0 up
hciconfig

Then feel free to try doing any Bluetooth attacks you want.



Happy Hacking :)

Flashed 2021.2.zip from kali official site.


"flash the kernel."
- I flashed the kernel you gave me... (and tried all with the kernel given in OP)

Flashed Magisk. Reboot...

"Then open a terminal and unzip this archive and run the script"
- OK. Added the script to /bin directory and ran it. It finished successfully. Got this "Successful building. Let's enjoy!"

"Run bluebinder..." (I had to start bluetooth service via "service bluetooth start" and I saw bluetoothd is ok)
- Done. I got this "Binder interface initialized, opening virtual device. Failed to open /dev/vhci deviceUnable to open virtual device"


Even with the fail above tried I tried this too
"Next step is open another terminal, run these commands"

-I got this for hci0 up >"Cant init device hci0: Invalid argument (22)"

- I got this for hciconfig >
"hci0: Type:primary Bus: USB BD Address : somemac ACL MTU:679:8 SCO MTU:48:16
DOWN
RX bytes: 706 acl:0 sco:0 events:22 errors:0
TC bytes: 68 acl:0 sco:0 commands:22 errors:0"


In Addition;
I saw 4 devices when I type rfkill. Devices are;
0- bluetooth bcm43xx Bluetoth unblocked unblocked
1- wlan phy0 unblocked unblocked
2- wlan brcmfmac-wifi unblocked unblocked
3- bluetooth hci0 unblocked unblocked


I couldn't find the breaking thing... If you use this way with no problem then I think I should too... but something is messy on my side... Couldn't managed...

Any idea? I'll give up and stop chasing this if you dont have any solution :)

Regards...
 

cooliceone

New member
Jul 2, 2015
3
0
Hi. Forgive me my english, it's not my native language.

Got it to work with SM-N960N device, that is born in Korea. And for Korea.
In a few words, pros:
Full fledged rooted debian-like terminal (I use nethunter since 2016 on Nexus 5, yet can't believe it's true).
External TL-WN722N works in monitor mode
Call recorder works just fine in Russia
Google Pay contactless works just fine

Cons:
Ugly "ST telecom" boot splash screen fixed here
Rarely in some cases (probably only while filling password fields) there are small blue korean hieroglyphs on the samsung keyboard over the english characters. Not much hassle, if you prefer Hacker's keyboard.
Rarely in random moments the "Failed to register in network (13)" toast appears. Doesn't seem to affect any viable features.

Step by step:
0. Lost my warranty. Prepared my mind for Note-9-brick.
1. Flushed LUC-N960NKSU3DTC4 official 4-flie firmware through Odin3_v3.14.4. Got it from samfrew.com . Sellected "CSC_...", but not "HOME_CSC_..." file. Do not flushed "USERDATA_..." file. (It was 5-file firmware to be honest). Also tried fresh november official firmware, but got endless bootloop after flushing nethunter kernel. There was "Auto-reboot" and "F. Reset time" option flags enabled in odin (default ones).
1.1. To enter download mode you need to power-off dedvice. Then connect usb cable from odin-armed PC, while holdin pressed vol-down+bixby keys.
2. Boot to system. From here onwards there may be case, when boot flash screen stalls forever with blue LED fading from lightblue to deepblue. In that case, just force reboot, holding vol-down+power keys. Also there might be few reboots, looking similar to bootloop, but if you count less than 5 sudden reboots, just let em go.
3. Skipped all the setup steps, except Wi-Fi connection. Skipped google acc, samsung acc and whatever.
4. Wait all the updates in status bar.
5. Finished device setup, appearing in status bar. Yet skipping all steps.
6. Flushed twrp-3.2.3-0-crownlte_UNOFFICIAL.tar.md5 through odin. From the "AP" slot. The "Auto-reboot" option flag in odin must be unchecked. After "PASS" notification appeared in odin, hold vol-down+power keys till blacck screen, then rapidly switch fingers to vol-up+bixby+power keys, till samsung logo appears, then release power key till TEAMWIN logo appears, then release all the keys.
7. Wipe -> Format data in TWRP.
8. Reboot back to TWRP
9. Flushed respectful N960_F_DS_N_DrKetan_custom_ROM_Q11.zip through TWRP. File was on SD card. To find it in TWRP go to "../external_sd". I've also choose to flash SM-N960F CSC instead of SM-N960N in aroma installer.
10. Reboot to system, skipped all the setup, except Wi-Fi, wait all the updates in status bar, finish setup from status bar, but skip all.
11. Entered Magisk manager, disabled notification toasts about root priviledges.
12. Entered "ROM Tool" app, provided root priviledges, applied essential fix.
13. Reboot back to system, then reboot to TWRP
15. Flushed respectful kali chroot ( nethunter-2020.4-generic-arm64-kalifs-full.zip ), reboot back to TWRP
16. Flushed respectful kali kernel ( Nethunter-Kernel-Note9.zip ), reboot back to TWRP
17. Flushed respectful Magisk-v20.4.zip, then flushed Disable_Dm-Verity_ForceEncrypt_11.02.2020.zip, reboot back to TWRP
18. Flushed Magisk-v20.4.zip one more time.
19. Reboot to system.
20. Installed NetHunterStore.apk
21. Installed NetHunter terminal through NetHunterStore
22. Installed NetHunter app through NetHunterStore
23. Entered NetHunter app, finiished chroot setup
24. Entered NetHunter terminal, go to ~ to fill the power of root, do some apt-get update stuff.
25. Enabled Magisk hide option and renamed magisk manager within Magisk settings.
26. Reboot to system. Magisk fails to run with "This app keeps crashing".
27. Installed Magisk manager 8.0.3 from SD.
28. Disabled and re-enabled Magisk hide and renamed magisk manager within Magisk settings.
29. Reboot to system
30. Installed Magisk module "MagiskHide Props config" ?
31. Entered NetHunter terminal (AndroidSu for now)
32. Run "props"
33. Choose pt. 2 to force basic auth, end up with SM-A300FU device fingerprint.

Steps 30 to 33 may be simplified to Open "ROM Tool" app, -> Mods & Fix -> SafetyNet fix -> Apply. End up with SM-N770F device fingerprint. That really seem to be better, than one set with "props". Thank's to @dr.ketan for mention that.
34. Reboot to system
35. Add card to GPay, pay contactless, do record some calls, collect some wi-fi handshakes.

Thanks to all brave hackers who made it possible. TEAMWIN devs, Magisk devs, Kali devs, @dr.ketan, @Thiviyan, @anastasiszn, and all who are involved, xda-devs.com and 4pda.ru users. It's great to have all those features working.
Where can I find all these tools versions, or do you think the new ones also works?
 

Top Liked Posts

  • There are no posts matching your filters.
  • 16
    https%3A%2F%2Fexternal-content.duckduckgo.com%2Fiu%2F%3Fu%3Dhttp%253A%252F%252F4.bp.blogspot.com%252F-FtNXxWQDe2g%252FVCGxxe9noRI%252FAAAAAAAADF0%252F2H8K74p_D58%252Fs1600%252Fnethunter-banner.png%26f%3D1%26nofb%3D1


    * Your warranty is now void.
    *
    * We're not responsible for bricked devices, dead SD cards,
    * thermonuclear war, or you getting fired because the alarm app failed. Please
    * do some research if you have any concerns about features included in this Kernel
    * before flashing it! YOU are choosing to make these modifications, and if
    * you point the finger at us for messing up your device, we will laugh at you.


    A project by Offensive Security


    The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs.


    About the kernel:


    For AOSP/ONEUi (2 different files)

    ONEUi kernel is based on Stock sources
    AOSP Kernel is based on LOS sources.

    Features:
    * Added all the Nethunter supported wifi adapter drivers.
    * Premissive
    * ALl the USB functions in Arsenal Settings added

    Whats not working:
    * HID interface got some problems and will be fixed in future.

    INSTALLATION

    * Download latest Kernel from Here https://drive.google.com/file/d/1q8b3pXlveONWU0abX3K2nv6dRfroZvp4/view?usp=share_link
    * Download latest Nethunter GenericArm64.zip from here https://images.kali.org/nethunter/nethunter-2020.3-generic-arm64-kalifs-full.zip
    * Boot into recovery
    * Flash nethunter-2020.3-generic-arm64-kalifs-full.zip
    * Flash Nethunter-Kernel-Note9.zip
    * Reflash Magisk (it has to be done even if you already have done)
    * Reboot to system

    Now Enjoy - fully functional Nethunter in your Galaxy Note-9


    XDA:DevDB Information
    Nethunter Kernel, Kernel for the Samsung Galaxy Note 9

    Contributors
    Thiviyan, anastasiszn
    Source Code: https://gitlab.com/s133py/nethunter-kernel-note9

    Kernel Special Features: All the nethunter features added (HID has bugs will be fixed in future)

    Version Information
    Status:
    Stable
    Current Stable Version: V 2.0
    Stable Release Date: 2020-09-09

    Created 2020-07-09
    Last Updated 2020-11-09
    2
    Testing on Dr.Ketans Q ROM.
    @dr.ketan
    2
    Hi. Forgive me my english, it's not my native language.

    Got it to work with SM-N960N device, that is born in Korea. And for Korea.
    In a few words, pros:
    Full fledged rooted debian-like terminal (I use nethunter since 2016 on Nexus 5, yet can't believe it's true).
    External TL-WN722N works in monitor mode
    Call recorder works just fine in Russia
    Google Pay contactless works just fine

    Cons:
    Ugly "ST telecom" boot splash screen fixed here
    Rarely in some cases (probably only while filling password fields) there are small blue korean hieroglyphs on the samsung keyboard over the english characters. Not much hassle, if you prefer Hacker's keyboard.
    Rarely in random moments the "Failed to register in network (13)" toast appears. Doesn't seem to affect any viable features.

    Step by step:
    0. Lost my warranty. Prepared my mind for Note-9-brick.
    1. Flushed LUC-N960NKSU3DTC4 official 4-flie firmware through Odin3_v3.14.4. Got it from samfrew.com . Sellected "CSC_...", but not "HOME_CSC_..." file. Do not flushed "USERDATA_..." file. (It was 5-file firmware to be honest). Also tried fresh november official firmware, but got endless bootloop after flushing nethunter kernel. There was "Auto-reboot" and "F. Reset time" option flags enabled in odin (default ones).
    1.1. To enter download mode you need to power-off dedvice. Then connect usb cable from odin-armed PC, while holdin pressed vol-down+bixby keys.
    2. Boot to system. From here onwards there may be case, when boot flash screen stalls forever with blue LED fading from lightblue to deepblue. In that case, just force reboot, holding vol-down+power keys. Also there might be few reboots, looking similar to bootloop, but if you count less than 5 sudden reboots, just let em go.
    3. Skipped all the setup steps, except Wi-Fi connection. Skipped google acc, samsung acc and whatever.
    4. Wait all the updates in status bar.
    5. Finished device setup, appearing in status bar. Yet skipping all steps.
    6. Flushed twrp-3.2.3-0-crownlte_UNOFFICIAL.tar.md5 through odin. From the "AP" slot. The "Auto-reboot" option flag in odin must be unchecked. After "PASS" notification appeared in odin, hold vol-down+power keys till blacck screen, then rapidly switch fingers to vol-up+bixby+power keys, till samsung logo appears, then release power key till TEAMWIN logo appears, then release all the keys.
    7. Wipe -> Format data in TWRP.
    8. Reboot back to TWRP
    9. Flushed respectful N960_F_DS_N_DrKetan_custom_ROM_Q11.zip through TWRP. File was on SD card. To find it in TWRP go to "../external_sd". I've also choose to flash SM-N960F CSC instead of SM-N960N in aroma installer.
    10. Reboot to system, skipped all the setup, except Wi-Fi, wait all the updates in status bar, finish setup from status bar, but skip all.
    11. Entered Magisk manager, disabled notification toasts about root priviledges.
    12. Entered "ROM Tool" app, provided root priviledges, applied essential fix.
    13. Reboot back to system, then reboot to TWRP
    15. Flushed respectful kali chroot ( nethunter-2020.4-generic-arm64-kalifs-full.zip ), reboot back to TWRP
    16. Flushed respectful kali kernel ( Nethunter-Kernel-Note9.zip ), reboot back to TWRP
    17. Flushed respectful Magisk-v20.4.zip, then flushed Disable_Dm-Verity_ForceEncrypt_11.02.2020.zip, reboot back to TWRP
    18. Flushed Magisk-v20.4.zip one more time.
    19. Reboot to system.
    20. Installed NetHunterStore.apk
    21. Installed NetHunter terminal through NetHunterStore
    22. Installed NetHunter app through NetHunterStore
    23. Entered NetHunter app, finiished chroot setup
    24. Entered NetHunter terminal, go to ~ to fill the power of root, do some apt-get update stuff.
    25. Enabled Magisk hide option and renamed magisk manager within Magisk settings.
    26. Reboot to system. Magisk fails to run with "This app keeps crashing".
    27. Installed Magisk manager 8.0.3 from SD.
    28. Disabled and re-enabled Magisk hide and renamed magisk manager within Magisk settings.
    29. Reboot to system
    30. Installed Magisk module "MagiskHide Props config" ?
    31. Entered NetHunter terminal (AndroidSu for now)
    32. Run "props"
    33. Choose pt. 2 to force basic auth, end up with SM-A300FU device fingerprint.

    Steps 30 to 33 may be simplified to Open "ROM Tool" app, -> Mods & Fix -> SafetyNet fix -> Apply. End up with SM-N770F device fingerprint. That really seem to be better, than one set with "props". Thank's to @dr.ketan for mention that.
    34. Reboot to system
    35. Add card to GPay, pay contactless, do record some calls, collect some wi-fi handshakes.

    Thanks to all brave hackers who made it possible. TEAMWIN devs, Magisk devs, Kali devs, @dr.ketan, @Thiviyan, @anastasiszn, and all who are involved, xda-devs.com and 4pda.ru users. It's great to have all those features working.
    1
    does this kernel support f2fs?? is ettercap working can anyone confirm?

    Kernel is based on stock kernel without modifications. Ettercap works perfect :)
    1
    k

    kernel file not found ..
    i have samsung note9 (sm-n960f ) i have been looking all day for a kernel
    link fixed