[ROM][Official] Kali NetHunter for the Huawei Nexus 6P LOS17.1

Search This thread

riomenx

Member
Feb 2, 2020
22
3
The instructions need to be revised. For a beginner, it will be very difficult to repeat the steps. Some steps are incorrectly described. For example, copying files. Everything can be done much easier.
 
  • Like
Reactions: steso90

yesimxev

Senior Member
May 8, 2017
495
173
Forgive me for the ridiculous questions.
- Reboot into TWRP
- Copy fstab to /system_root/
Code:
adb push fstab.angler /sdcard/
adb shell "twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/fstab.angler /system_root/"
1)Are these commands executed in TWRP?
- copy Nexmon libs over to /system/lib64/ from the nexmon.zip (not in TWRP):
Code:
adb push libnexmon* /sdcard/ && adb push nexutil /sdcard/
- and copy using androidsu terminal:
Code:
mount -o rw,remount / && cp /sdcard/libnexmonkali.so /system/lib64/kalilibnexmon.so && cp /sdcard/libnexmon.so /system/lib64/ && cp /sdcard/nexutil /system/xbin/ && chmod a+x /system/xbin/nexutil
2)How should I do the copying via android su if Nethunter is not installed yet?
For devices which have no space left on system: you need to copy those files before flashing NetHunter. I didn't have this problem, maybe due to GApps pico. Then use the following commands in TWRP:
Code:
twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/libnexmonkali.so /system_root/system/lib64/kalilibnexmon.so && cp /sdcard/libnexmon.so /system_root/system/lib64/ && cp /sdcard/nexutil /system_root/system/xbin/ && chmod a+x /system_root/system/xbin/nexutil
3)This code is executed for those who have no space left?
4)We take the last Nethunter image from here https://www .kali.org/get-kali/#kali-mobile?
5)What is this Bootanimation TWRP flashes file for - https://www.androidfilehost.com /?fid=10763459528675571003. I didn't see this file used in the instructions
6)What this code gives us:
echo LD_PRELOAD=/system/lib64/kalilibnexmon.so
Do I need to enter the code in the kali terminal?
1. adb push has to be done from PC
2. Copying nexutil (after you pushed to the phoen) has to be done when android is running (at this point ROM, gapps and magisk is already installed so androidsu can be accessed with adb shell)
3. For people with no space left, everything is the same, except NetHunter will be flashed last.
4. Yes, latest version is uploaded to kali site
5. I think bootanimation flashes automatically or not?
6. export LD_PRELOAD has to be done once, when you open nh (kali) terminal, after you ran nexutil -m2 in androidsu, so the wlan0 will be in monitor mode.

I'll revise, I don't have that phone anymore, I couldn't test since 2 years
 

riomenx

Member
Feb 2, 2020
22
3
1. adb push has to be done from PC
2. Copying nexutil (after you pushed to the phoen) has to be done when android is running (at this point ROM, gapps and magisk is already installed so androidsu can be accessed with adb shell)
3. For people with no space left, everything is the same, except NetHunter will be flashed last.
4. Yes, latest version is uploaded to kali site
5. I think bootanimation flashes automatically or not?
6. export LD_PRELOAD has to be done once, when you open nh (kali) terminal, after you ran nexutil -m2 in androidsu, so the wlan0 will be in monitor mode.

I'll revise, I don't have that phone anymore, I couldn't test since 2 years
Thanks for answers. Well, I'll still switch to 8.1 android. The system itself is more stable. Nethanter worked fine on android 8.1 in terms of attacking wi-fi. What phone are you currently using for NH and have you had to modify the kernel. I'm leaning towards buying a raspberry pi but haven't decided yet.
 

yesimxev

Senior Member
May 8, 2017
495
173
Thanks for answers. Well, I'll still switch to 8.1 android. The system itself is more stable. Nethanter worked fine on android 8.1 in terms of attacking wi-fi. What phone are you currently using for NH and have you had to modify the kernel. I'm leaning towards buying a raspberry pi but haven't decided yet.
Nexus 6P is perfect, I have a slightly smaller Mi A3. I'm thinking about patching oreo in next month as you're not the first one
 

xer0her0

New member
Apr 18, 2023
1
0
any support for RTL8188EUS (TL-WN725N) for this? it shows in lsusb but doesnt show as wlan1.

Edit: there's a kernel around the pages 8-10 for 8188eus, my lazy ass didn't bother looking twice.

Edit2: it still doesn't show up even after flashing with 8188eus kernel, am I doing smth wrong? Tried apt update upgrade full upgrade no changes.

Edit3: got it working, had to install Fox's MMM and then install wireless firmware for nethunter using that, now it works perfectly.
 

Attachments

  • Screenshot_20230419-045328_NetHunter_Terminal.png
    Screenshot_20230419-045328_NetHunter_Terminal.png
    206 KB · Views: 20
  • Screenshot_20230419-045429_NetHunter_Terminal.png
    Screenshot_20230419-045429_NetHunter_Terminal.png
    243.6 KB · Views: 19
Last edited:

yesimxev

Senior Member
May 8, 2017
495
173
any support for RTL8188EUS (TL-WN725N) for this? it shows in lsusb but doesnt show as wlan1.

Edit: there's a kernel around the pages 8-10 for 8188eus, my lazy ass didn't bother looking twice.

Edit2: it still doesn't show up even after flashing with 8188eus kernel, am I doing smth wrong? Tried apt update upgrade full upgrade no changes.

Edit3: got it working, had to install Fox's MMM and then install wireless firmware for nethunter using that, now it works perfectly.
Yeah that TWRP version doesn't flash firmware files from the nh zip it seems
 

U2tzJTNE

New member
Sep 3, 2018
3
1
When I use "airmon-ng start wlan1", the following prompt will appear

"found phy0 with no interfaces assigned, would you like to assign one to it?"

This also caused wifite to be unusable

how can i solve this problem?

(I tested nethunter-2022.4-angler-oreo-kalifs-full and nethunter-2023.1-angler-los-ten-kalifs-full)
 

yesimxev

Senior Member
May 8, 2017
495
173
When I use "airmon-ng start wlan1", the following prompt will appear

"found phy0 with no interfaces assigned, would you like to assign one to it?"

This also caused wifite to be unusable

how can i solve this problem?

(I tested nethunter-2022.4-angler-oreo-kalifs-full and nethunter-2023.1-angler-los-ten-kalifs-full)
Just use the NH app custom command to put wlan1 to mon mode, it loves that way
 

U2tzJTNE

New member
Sep 3, 2018
3
1
Just use the NH app custom command to put wlan1 to mon mode, it loves that way
Yes, it does work, but wifite still doesn't work.

When I execute wifite, it will stay here consistently.

Thanks for your work.
 

Attachments

  • 微信截图_20230427000215.png
    微信截图_20230427000215.png
    8.3 KB · Views: 16
  • 微信截图_20230427000456.png
    微信截图_20230427000456.png
    25.3 KB · Views: 15

yesimxev

Senior Member
May 8, 2017
495
173
That wifite is not in the kali packages yet so can't be included. git clone that repo and run wifite.py
 

steso90

Senior Member
Jan 15, 2014
201
41
Sweden
Sony Xperia XZ Premium

yesimxev

Senior Member
May 8, 2017
495
173
sorry i was thinking about nethunter and everything in this thread so everything is as easy like in nethunter for 8.1 like this https://forum.xda-developers.com/t/...-for-the-huawei-nexus-6p-android-8-1.4080807/

EDIT:
ive reflashed los 17.1 and your step like 20 times and its always something that gets wrong.. im not so good at this
The only major difference should be the flashing vendor.squashfs. Anyway, i'll update oreo kernel at some point. What fails on LOS17.1?
 

steso90

Senior Member
Jan 15, 2014
201
41
Sweden
Sony Xperia XZ Premium
The only major difference should be the flashing vendor.squashfs. Anyway, i'll update oreo kernel at some point. What fails on LOS17.1?
Only user error and a lack of understanding at my part.

Got everything working exept capturing handshakes on wlan0.

It seems like deauth dont work like it should and kismet says some deauth error when i try to capture handshake.

I have setup diffrent hotspots that other devices i have can directly capture handshake without problem so somthing with wlan0, i read about som firmware for wlan0 (fw_bcmdhd.bin.nexmon) do this file also need to be transferd?

Thank you for your work!
 

yesimxev

Senior Member
May 8, 2017
495
173
Only user error and a lack of understanding at my part.

Got everything working exept capturing handshakes on wlan0.

It seems like deauth dont work like it should and kismet says some deauth error when i try to capture handshake.

I have setup diffrent hotspots that other devices i have can directly capture handshake without problem so somthing with wlan0, i read about som firmware for wlan0 (fw_bcmdhd.bin.nexmon) do this file also need to be transferd?

Thank you for your work!
You're welcome! Yes rename to fw_bcmdhd.bin and place to /vendor/firmware (check if I'm wrong)
 
Last edited:

steso90

Senior Member
Jan 15, 2014
201
41
Sweden
Sony Xperia XZ Premium

Top Liked Posts

  • There are no posts matching your filters.
  • 3
    @yesimxev Size of original vendor file posted before has size of 88.7MB but now the new file downloaded size is only 18.5 MB, i think this not the original file and only its name is replaced as vendor.squashfs.zip and one more thing I also try to replaced the file id and name in above link and try to download it with wget, but it throw 403 forbidden.
    Ah yes. Ignore, I'll get it soon
    2
    Im waiting too... LOL

    EDIT: Its possible to install everything and leave this squasfs file to install later? I have my phone on TWRP screen for almost two days now waiting while im trying to find this squashfs flie. XDDD
    I've got it. Yes you could, it's for the nexmon firmware only. https://github.com/yesimxev/nethunter_files/raw/main/angler/vendor.squashfs.zip

    @motbot @steso90 @anonveni
    1

    yesimxev


    The squasfs mirror is down.

    Do you mind uploading it please?
  • 18
    https:_gitlab.com_kalilinux_nethunter_build-scripts_kali-nethunter-project_raw_master_images_n...png


    I present to you: Kali NetHunter for the Huawei Nexus 6P LOS17.1

    Kali NetHunter is an Android ROM overlay that turns an ordinary phone into the ultimate Mobile Penetration Testing Platform.
    The overlay includes a custom kernel, a Kali Linux chroot, an accompanying Android application, which allows for easier interaction with various security tools and attacks, as well as a client to the Kali NetHunter App Store.
    Beyond the penetration testing tools arsenal within Kali Linux and the Kali NetHunter App Store, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page.
    NetHunter is an open-source project developed by Offensive Security and the community.

    ~ Prerequisites ~
    - TWRP - https://drive.google.com/open?id=1axm3GVbTKypUdQAuYubNknJX4wKRFIec
    - Stock components - vendor, radio, & bootloader img's from the stock oreo 8.1 OPM7.181205.001 Dec 2018 factory image - https://androidfilehost.com/?w=files&flid=286833
    - Magisk – https://forum.xda-developers.com/apps/magisk

    ~~ Downloads ~~
    - NetHunter installer (find the latest release for Nexus 6P): https://www.kali.org/get-kali/#kali-mobile
    - fstab with disabled forceencrpyt - https://www.androidfilehost.com/?fid=4349826312261764572
    - vendor image with patched fw for nexmon - https://www.androidfilehost.com/?fid=8889791610682949885
    - nexmon zip with nexutil and libs - https://www.androidfilehost.com/?fid=8889791610682951480
    - Bootanimation TWRP flasher - https://www.androidfilehost.com/?fid=10763459528675571003

    ~~ How to Install ~~
    - Assuming you have flashed stock radio, vendor, bootloader, TWRP, and Lineage 17.1 (using the steps from https://forum.xda-developers.com/ne...t/rom-lineageos-17-0-nexus-6p-angler-t4012099)
    - Plug in to PC if you haven't done that yet
    - Reboot into TWRP
    - Format data
    - Copy Magisk, NetHunter image, and fstab to USB-C drive or adb push to /sdcard
    - Reboot into bootloader and flash vendor which was unzipped from zip
    Code:
    fastboot flash vendor vendor.squashfs
    - Reboot into TWRP
    - Copy fstab to /system_root/
    Code:
    adb push fstab.angler /sdcard/
    adb shell "twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/fstab.angler /system_root/"
    - Format data
    - Reboot to system & do Android setup
    - Reboot into TWRP
    - Install Nexmon files through adb, from the zip above
    Code:
    twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/libnexmonkali.so /system_root/system/lib64/kalilibnexmon.so && cp /sdcard/libnexmon.so /system_root/system/lib64/ && cp /sdcard/nexutil /system_root/system/xbin/ && chmod a+x /system_root/system/xbin/nexutil
    - Flash NetHunter image
    - Flash Magisk
    - Reboot
    - Run NetHunter app, update from NH Store
    - Reboot

    ~~~ Notes & Updates ~~~
    Nexmon is finally working with injection in Kali Chroot , although EAPOL data is still not (or malformed) in the captures.

    - copy Nexmon libs over to /system/lib64/ from the nexmon.zip (not in TWRP):
    Code:
    adb push libnexmon* /sdcard/ && adb push nexutil /sdcard/
    - and copy using androidsu terminal:
    Code:
    mount -o rw,remount / && cp /sdcard/libnexmonkali.so /system/lib64/kalilibnexmon.so && cp /sdcard/libnexmon.so /system/lib64/ && cp /sdcard/nexutil /system/xbin/ && chmod a+x /system/xbin/nexutil

    For devices which have no space left on system: you need to copy those files before flashing NetHunter. I didn't have this problem, maybe due to GApps pico. Then use the following commands in TWRP:
    Code:
    twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/libnexmonkali.so /system_root/system/lib64/kalilibnexmon.so && cp /sdcard/libnexmon.so /system_root/system/lib64/ && cp /sdcard/nexutil /system_root/system/xbin/ && chmod a+x /system_root/system/xbin/nexutil

    Thanks @JaK3sT for discovering this!

    You have to make sure that wifi is on but you're not connected to an AP.
    Enable in AndroidSU terminal, I created a custom command with
    Code:
    nexutil -m2
    Export LD_PRELOAD for faking ioctl in every Kali Chroot terminal window you open
    Code:
    export LD_PRELOAD=/system/lib64/kalilibnexmon.so

    Hijacker is not fully supported as I've built one with aarch64 tools, but it randomly stops airodump although it's working. Will give it a shot in the future.

    - Mana is being replaced, for the time being you can downgrade iptables in chroot with the following :
    Code:
    wget http://old.kali.org/kali/pool/main/i/iptables/iptables_1.6.2-1.1_arm64.deb
    wget http://old.kali.org/kali/pool/main/i/iptables/libip4tc0_1.6.2-1.1_arm64.deb
    wget http://old.kali.org/kali/pool/main/i/iptables/libip6tc0_1.6.2-1.1_arm64.deb
    wget http://old.kali.org/kali/pool/main/i/iptables/libiptc0_1.6.2-1.1_arm64.deb
    wget http://old.kali.org/kali/pool/main/i/iptables/libxtables12_1.6.2-1.1_arm64.deb
    
    dpkg -i *.deb
    
    apt-mark hold iptables
    apt-mark hold libip4tc0
    apt-mark hold libip6tc0
    apt-mark hold libiptc0
    apt-mark hold libxtables12

    Credits: The Offensive Security Team and the NetHunter community, huge thanks to Re4son & kimocoder for patching the wlan1 insert reboot issue! Long time mystery.
    Another extremely big thanks for @draco42 for patching libnexmon and kalilibnexmon!

    Android Version: 10.0

    XDA: DevDB Information
    Kali Nethunter, Kernel & ROM for the Huawei Nexus 6P

    Contributors
    @Re4son, @kimocoder, @yesimxev, @draco42

    Source Code: https://gitlab.com/kalilinux/nethunter/
    Kernel Source: https://github.com/Re4son/android_kernel_huawei_angler
    5
    yes brother. but what about LOS ??? i'm facing issues with it.

    Beside the annoying forced encryption and the regarding usage of a compatible FBE recovery build of Twrp, which need endlessly to boot up by the way, couldn't I detect any major or even minor problems with the new release.

    I am not a particular fan of LineageOS, never was, but @Re4son hit it with this kernel definitely one wide over the fence. *gg*

    For future reference -

    Statments like "facing issues'" aren't particular information sources.

    I do normally not respond to such posts at all, but _if_ there are actually problems, you should provide logcats, dmesg or adb outputs.

    Otherwise nobody can help you. ;)

    Many heaps

    edit.

    I wanted to underline the above message.

    I waited a long time and two Nexus 6P for these releases.
    In the meantime did I try to help and supported several user all over the Nethunter related kernel releases on XDA over 3 years [no bragging, just fyi!].

    It would be a shame to see this thread overrun with statments like above, or dumb talk in which degree whatever.

    This phone is an old timer with huge hardware issues and the user who use it, didn't run into Blod/battery or complete meltdown failure yet, or are just Nexus addicts and massive fanbois ^^

    With a reference to post from developer like @yesimxev, @Re4son and @kimocoder, who are undoubtedly pros in various areas (kernel development, wireless technology, network, pen-testing..), with limited resources like time, energy and the graciousness of giving a crap^^(scnr), does it go (hopefully) without saying that every user behaves, provides the very easy to obtain, above mentioned, log reports and don't start with such nonsense, if someone "could hack a(sic!) wifi", "my gf's facebook" or any other of these kind of dumb requests.

    I hope we can try to treasure this amazing work for some time longer..

    With best wishes

    UsPdSr
    3
    @yesimxev Size of original vendor file posted before has size of 88.7MB but now the new file downloaded size is only 18.5 MB, i think this not the original file and only its name is replaced as vendor.squashfs.zip and one more thing I also try to replaced the file id and name in above link and try to download it with wget, but it throw 403 forbidden.
    Ah yes. Ignore, I'll get it soon
    2
    For all those who suffered because of my booboo. To install fstab.angler, do:
    Code:
    adb push fstab.angler /sdcard/
    adb shell "twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/fstab.angler /system_root/"
    Then continue with the step format /data
    I'll revise the instructions soon
    2
    Im waiting too... LOL

    EDIT: Its possible to install everything and leave this squasfs file to install later? I have my phone on TWRP screen for almost two days now waiting while im trying to find this squashfs flie. XDDD
    I've got it. Yes you could, it's for the nexmon firmware only. https://github.com/yesimxev/nethunter_files/raw/main/angler/vendor.squashfs.zip

    @motbot @steso90 @anonveni