[ROM][Official] Kali NetHunter for the Huawei Nexus 6P LOS17.1

Search This thread

yesimxev

Senior Member
May 8, 2017
589
193
Good Catch! You notice my mistake. Actually I'm using the newer version of twrp which doesn't support FBE, Now I reinstall twrp and repeating the whole process again. But it is now showing 2 vendor folders at mounting option. But it is now working and I'm reinstalling lineage and nethunter
Yes, ignore that please. I'm not sure why is it but it's ok
 

anonveni

Member
May 24, 2023
8
0
@yesimxev After installation, updating and upgrading the nethunter and followed all steps to copy the nexmon files available in the correct location. There are no signs of wifi monitoring and bluetooth attack as both wlan0 and hci0 not detected. I'm not sure it is problem with kernel or what. Secondly Hid attacks are not available and i think that hid has some connection with monitor mode. 3rd thing is USB Arsenal option is not present from where i could enable the hid. If i have to install some other kernel kindly guide me briefly or if there is an other issue just point it. Many thanks!
 

Attachments

  • 1685739979753.png
    1685739979753.png
    518.3 KB · Views: 14

yesimxev

Senior Member
May 8, 2017
589
193
@yesimxev After installation, updating and upgrading the nethunter and followed all steps to copy the nexmon files available in the correct location. There are no signs of wifi monitoring and bluetooth attack as both wlan0 and hci0 not detected. I'm not sure it is problem with kernel or what. Secondly Hid attacks are not available and i think that hid has some connection with monitor mode. 3rd thing is USB Arsenal option is not present from where i could enable the hid. If i have to install some other kernel kindly guide me briefly or if there is an other issue just point it. Many thanks!
The kernel was not flashed properly. Did you flash nexus 6p zip or generic (lite)? So you did scroll down to nexus 6p on kali website?

Should be https://kali.download/nethunter-images/kali-2023.2/nethunter-2023.2-angler-los-ten-kalifs-full.zip

You can flash this kernel zip if you don't want to reflash the full zip https://www.androidfilehost.com/?fid=4279422670115730196
 

Qazianwar222

Senior Member
Jun 2, 2023
69
11

Attachments

  • Screenshot_20230603-092158.png
    Screenshot_20230603-092158.png
    513.1 KB · Views: 9
  • Screenshot_20230603-091716.png
    Screenshot_20230603-091716.png
    158.6 KB · Views: 9

Qazianwar222

Senior Member
Jun 2, 2023
69
11
I am having a problem
When I try to execute wifite it gets stuck
 

Attachments

  • Screenshot_20230605-083150_NetHunter_Terminal.png
    Screenshot_20230605-083150_NetHunter_Terminal.png
    139.9 KB · Views: 15

Qazianwar222

Senior Member
Jun 2, 2023
69
11
I am on nexus 6p and another issue I am having is that I can't locate the con_mode file
The module directory doesn't have a folder naming wlan
 

Attachments

  • Screenshot_20230605-182021_NetHunter_Terminal.png
    Screenshot_20230605-182021_NetHunter_Terminal.png
    138.1 KB · Views: 11

yesimxev

Senior Member
May 8, 2017
589
193
I am on nexus 6p and another issue I am having is that I can't locate the con_mode file
The module directory doesn't have a folder naming wlan
Use monitor mode as I mention in the post. No need for custom command in NH app, that's for qcacld phones, this is nexmon bcm.

Also, when you enable nexutil, the exported in new terminal, use like wifite -i wlan0
 

Qazianwar222

Senior Member
Jun 2, 2023
69
11
Yup I got wifite working on wlan0
But this is what I am getting as an output
Is it working the way normal or I have bugs?
 

Attachments

  • Screenshot_20230606-094031_NetHunter_Terminal.png
    Screenshot_20230606-094031_NetHunter_Terminal.png
    290 KB · Views: 18

Qazianwar222

Senior Member
Jun 2, 2023
69
11
This is what I get when I try to airmon-ng start wlan0
Sorry for my bad English but is the nexus 6p capable of enabling monitor mode from its internal chipset?
 

Attachments

  • Screenshot_20230606-094746_NetHunter_Terminal.png
    Screenshot_20230606-094746_NetHunter_Terminal.png
    203.7 KB · Views: 18

anonveni

Member
May 24, 2023
8
0
@yesimxev
Considering your expertise and previous work in this field, I would be extremely grateful if you could create and upload a detailed video tutorial explaining the step-by-step process of how to play with monitor mode on nexus 6p and how to crack wifi in nexus 6p after installing all prerequisites and also for using Wifite in Nethunter on the Nexus 6P. This would greatly benefit not only myself but also many others who are eager to learn about this topic.

If possible, could you please cover all the necessary prerequisites, installation instructions, configuration settings, and demonstrate the actual usage of wifi tools and how to enable them in nethunter, hijacker, and Wifite in Nethunter on the Nexus 6P? Including any tips, tricks, or potential pitfalls to watch out for would be highly appreciated as well.
I have no doubt that a video tutorial from you would be immensely valuable and widely appreciated within the hacking and cybersecurity community.

Thank you in advance for considering my request. I eagerly await your response and, if possible, the creation of the video tutorial. Keep up the fantastic work!
 

yesimxev

Senior Member
May 8, 2017
589
193
@yesimxev
Considering your expertise and previous work in this field, I would be extremely grateful if you could create and upload a detailed video tutorial explaining the step-by-step process of how to play with monitor mode on nexus 6p and how to crack wifi in nexus 6p after installing all prerequisites and also for using Wifite in Nethunter on the Nexus 6P. This would greatly benefit not only myself but also many others who are eager to learn about this topic.

If possible, could you please cover all the necessary prerequisites, installation instructions, configuration settings, and demonstrate the actual usage of wifi tools and how to enable them in nethunter, hijacker, and Wifite in Nethunter on the Nexus 6P? Including any tips, tricks, or potential pitfalls to watch out for would be highly appreciated as well.
I have no doubt that a video tutorial from you would be immensely valuable and widely appreciated within the hacking and cybersecurity community.

Thank you in advance for considering my request. I eagerly await your response and, if possible, the creation of the video tutorial. Keep up the fantastic work!
I'd be very happy to do so. First things first, I have to finish my course, then port nexmon to another phone. As I sold the 6P. Then do a video with that
 
  • Like
Reactions: motbot

Qazianwar222

Senior Member
Jun 2, 2023
69
11
No need for airmon-ng. See bottom of my post guide. It says how to start nexmon and do scripts
Thanks I reinstalled full nethunter img step by step and followed all instructions :) It worked for me. And injection is also working on wlan0
One last issue I am having is that the OTG of my OS is not working and the error I get is that "Charging connected device via USB" . I also can't switch the control from USB to my Device
It says "Can't switch"
I can see HID interface working but can't get the connection to do so
When I connect my phone to PC it works fine but When I use OTG its stuck on charging
I also checked my OTG on other phones it works
Maybe a Software Bug I think?
 

yesimxev

Senior Member
May 8, 2017
589
193
Thanks I reinstalled full nethunter img step by step and followed all instructions :) It worked for me. And injection is also working on wlan0
One last issue I am having is that the OTG of my OS is not working and the error I get is that "Charging connected device via USB" . I also can't switch the control from USB to my Device
It says "Can't switch"
I can see HID interface working but can't get the connection to do so
When I connect my phone to PC it works fine but When I use OTG its stuck on charging
I also checked my OTG on other phones it works
Maybe a Software Bug I think?
You're welcome! What's not working, I don't get it. OTG means adapter for external wifi/bt etc. HID is always enabled, so you can try duckhunter with a simple STRING hello (when eg. notepad is running). It should work out of the box. No need to switch android usb mode
 

Qazianwar222

Senior Member
Jun 2, 2023
69
11
You're welcome! What's not working, I don't get it. OTG means adapter for external wifi/bt etc. HID is always enabled, so you can try duckhunter with a simple STRING hello (when eg. notepad is running). It should work out of the box. No need to switch android usb mode
My Bad HID is surely working Sorry for my Bad english
The problem is that every time when I try to use a OTG connector to get my USB or External wifi Adapter
It just charges the USB or External wifi adapter but not executes it
I am sending the Screenshots what I am having as an issue
 

Attachments

  • Screenshot_20230607-190900_Trebuchet.png
    Screenshot_20230607-190900_Trebuchet.png
    399.9 KB · Views: 6
  • Screenshot_20230607-190908_Trebuchet.png
    Screenshot_20230607-190908_Trebuchet.png
    349 KB · Views: 6
  • Screenshot_20230607-190917_Settings.png
    Screenshot_20230607-190917_Settings.png
    86.9 KB · Views: 5
  • Screenshot_20230607-190924_Settings.png
    Screenshot_20230607-190924_Settings.png
    88.7 KB · Views: 5
  • Screenshot_20230607-190934_Settings.png
    Screenshot_20230607-190934_Settings.png
    92.8 KB · Views: 6
  • Like
Reactions: tiagojpavan

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    Has done it worked great thanks again for that
    Oh glad to hear 🤧
  • 20
    https:_gitlab.com_kalilinux_nethunter_build-scripts_kali-nethunter-project_raw_master_images_n...png


    I present to you: Kali NetHunter for the Huawei Nexus 6P LOS17.1

    Kali NetHunter is an Android ROM overlay that turns an ordinary phone into the ultimate Mobile Penetration Testing Platform.
    The overlay includes a custom kernel, a Kali Linux chroot, an accompanying Android application, which allows for easier interaction with various security tools and attacks, as well as a client to the Kali NetHunter App Store.
    Beyond the penetration testing tools arsenal within Kali Linux and the Kali NetHunter App Store, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page.
    NetHunter is an open-source project developed by Offensive Security and the community.

    ~ Prerequisites ~
    - TWRP - https://drive.google.com/open?id=1axm3GVbTKypUdQAuYubNknJX4wKRFIec
    - Stock components - vendor, radio, & bootloader img's from the stock oreo 8.1 OPM7.181205.001 Dec 2018 factory image - https://androidfilehost.com/?w=files&flid=286833
    - Magisk – https://forum.xda-developers.com/apps/magisk

    ~~ Downloads ~~
    - NetHunter installer (find the latest release for Nexus 6P): https://www.kali.org/get-kali/#kali-mobile
    - fstab with disabled forceencrpyt - https://www.androidfilehost.com/?fid=4349826312261764572
    - vendor image with patched fw for nexmon - https://www.androidfilehost.com/?fid=8889791610682949885
    MIRROR: https://github.com/yesimxev/nethunter_files/raw/main/angler/vendor.squashfs.zip
    - nexmon zip with nexutil and libs - https://www.androidfilehost.com/?fid=8889791610682951480
    MIRROR: https://github.com/yesimxev/nethunter_files/raw/main/nexmon_draco.zip
    - Bootanimation TWRP flasher - https://www.androidfilehost.com/?fid=10763459528675571003

    ~~ How to Install ~~
    - Assuming you have flashed stock radio, vendor, bootloader, TWRP, and Lineage 17.1 (using the steps from https://forum.xda-developers.com/ne...t/rom-lineageos-17-0-nexus-6p-angler-t4012099)
    - Plug in to PC if you haven't done that yet
    - Reboot into TWRP
    - Format data
    - Copy Magisk, NetHunter image, and fstab to USB-C drive or adb push to /sdcard
    - Reboot into bootloader and flash vendor which was unzipped from zip
    Code:
    fastboot flash vendor vendor.squashfs
    - Reboot into TWRP
    - Copy fstab to /system_root/
    Code:
    adb push fstab.angler /sdcard/
    adb shell "twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/fstab.angler /system_root/"
    - Format data
    - Reboot to system & do Android setup
    - Reboot into TWRP
    - Install Nexmon files through adb, from the zip above
    Code:
    twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/libnexmonkali.so /system_root/system/lib64/kalilibnexmon.so && cp /sdcard/libnexmon.so /system_root/system/lib64/ && cp /sdcard/nexutil /system_root/system/xbin/ && chmod a+x /system_root/system/xbin/nexutil
    - Flash NetHunter image
    - Flash Magisk
    - Reboot
    - Run NetHunter app, update from NH Store
    - Reboot

    ~~~ Notes & Updates ~~~
    Nexmon is finally working with injection in Kali Chroot , although EAPOL data is still not (or malformed) in the captures.

    - copy Nexmon libs over to /system/lib64/ from the nexmon.zip (not in TWRP):
    Code:
    adb push libnexmon* /sdcard/ && adb push nexutil /sdcard/
    - and copy using androidsu terminal:
    Code:
    mount -o rw,remount / && cp /sdcard/libnexmonkali.so /system/lib64/kalilibnexmon.so && cp /sdcard/libnexmon.so /system/lib64/ && cp /sdcard/nexutil /system/xbin/ && chmod a+x /system/xbin/nexutil

    For devices which have no space left on system: you need to copy those files before flashing NetHunter. I didn't have this problem, maybe due to GApps pico. Then use the following commands in TWRP:
    Code:
    twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/libnexmonkali.so /system_root/system/lib64/kalilibnexmon.so && cp /sdcard/libnexmon.so /system_root/system/lib64/ && cp /sdcard/nexutil /system_root/system/xbin/ && chmod a+x /system_root/system/xbin/nexutil

    Thanks @JaK3sT for discovering this!

    You have to make sure that wifi is on but you're not connected to an AP.
    Enable in AndroidSU terminal, I created a custom command with
    Code:
    nexutil -m2
    Export LD_PRELOAD for faking ioctl in every Kali Chroot terminal window you open
    Code:
    export LD_PRELOAD=/system/lib64/kalilibnexmon.so

    Hijacker is not fully supported as I've built one with aarch64 tools, but it randomly stops airodump although it's working. Will give it a shot in the future.

    - Mana is being replaced, for the time being you can downgrade iptables in chroot with the following :
    Code:
    wget http://old.kali.org/kali/pool/main/i/iptables/iptables_1.6.2-1.1_arm64.deb
    wget http://old.kali.org/kali/pool/main/i/iptables/libip4tc0_1.6.2-1.1_arm64.deb
    wget http://old.kali.org/kali/pool/main/i/iptables/libip6tc0_1.6.2-1.1_arm64.deb
    wget http://old.kali.org/kali/pool/main/i/iptables/libiptc0_1.6.2-1.1_arm64.deb
    wget http://old.kali.org/kali/pool/main/i/iptables/libxtables12_1.6.2-1.1_arm64.deb
    
    dpkg -i *.deb
    
    apt-mark hold iptables
    apt-mark hold libip4tc0
    apt-mark hold libip6tc0
    apt-mark hold libiptc0
    apt-mark hold libxtables12

    Credits: The Offensive Security Team and the NetHunter community, huge thanks to Re4son & kimocoder for patching the wlan1 insert reboot issue! Long time mystery.
    Another extremely big thanks for @draco42 for patching libnexmon and kalilibnexmon!

    Android Version: 10.0

    XDA: DevDB Information
    Kali Nethunter, Kernel & ROM for the Huawei Nexus 6P

    Contributors
    @Re4son, @kimocoder, @yesimxev, @draco42

    Source Code: https://gitlab.com/kalilinux/nethunter/
    Kernel Source: https://github.com/Re4son/android_kernel_huawei_angler
    5
    yes brother. but what about LOS ??? i'm facing issues with it.

    Beside the annoying forced encryption and the regarding usage of a compatible FBE recovery build of Twrp, which need endlessly to boot up by the way, couldn't I detect any major or even minor problems with the new release.

    I am not a particular fan of LineageOS, never was, but @Re4son hit it with this kernel definitely one wide over the fence. *gg*

    For future reference -

    Statments like "facing issues'" aren't particular information sources.

    I do normally not respond to such posts at all, but _if_ there are actually problems, you should provide logcats, dmesg or adb outputs.

    Otherwise nobody can help you. ;)

    Many heaps

    edit.

    I wanted to underline the above message.

    I waited a long time and two Nexus 6P for these releases.
    In the meantime did I try to help and supported several user all over the Nethunter related kernel releases on XDA over 3 years [no bragging, just fyi!].

    It would be a shame to see this thread overrun with statments like above, or dumb talk in which degree whatever.

    This phone is an old timer with huge hardware issues and the user who use it, didn't run into Blod/battery or complete meltdown failure yet, or are just Nexus addicts and massive fanbois ^^

    With a reference to post from developer like @yesimxev, @Re4son and @kimocoder, who are undoubtedly pros in various areas (kernel development, wireless technology, network, pen-testing..), with limited resources like time, energy and the graciousness of giving a crap^^(scnr), does it go (hopefully) without saying that every user behaves, provides the very easy to obtain, above mentioned, log reports and don't start with such nonsense, if someone "could hack a(sic!) wifi", "my gf's facebook" or any other of these kind of dumb requests.

    I hope we can try to treasure this amazing work for some time longer..

    With best wishes

    UsPdSr
    3
    @yesimxev Size of original vendor file posted before has size of 88.7MB but now the new file downloaded size is only 18.5 MB, i think this not the original file and only its name is replaced as vendor.squashfs.zip and one more thing I also try to replaced the file id and name in above link and try to download it with wget, but it throw 403 forbidden.
    Ah yes. Ignore, I'll get it soon
    2
    For all those who suffered because of my booboo. To install fstab.angler, do:
    Code:
    adb push fstab.angler /sdcard/
    adb shell "twrp mount /system_root && twrp remountrw /system_root && cp /sdcard/fstab.angler /system_root/"
    Then continue with the step format /data
    I'll revise the instructions soon
    2
    Yes looks right, but to be honest i personally haven't used the commands when copying😅. I literally used TWRP's file manager and copied them manually.