[ROM][Official] Kali NetHunter for the Huawei Nexus 6P LOS17.1

yesimxev

Senior Member
May 8, 2017
68
28
18
Thank you! However I got another problem, when I execute nexutil -m2 it failed. May I know what was going on? (I turned on wifi and not connected to any AP)

Here is the record:
Code:
:/ # mount -o rw,remount / 
:/ # cp /sdcard/libnexmonkali.so /system/lib64/kalilibnexmon.so
:/ # cp /sdcard/libnexmon.so /system/lib64/
:/ # cp /sdcard/nexutil /system/xbin/
:/ # nexutil -m2
/system/bin/sh: nexutil: can't execute: Permission denied
126|:/ #
Also do a
Code:
chmod a+x /system/xbin/nexutil
 

arti2525

New member
Jul 3, 2019
3
0
1
Help

Hi, sorry for my bad English, but I have a problem
I can't do this step:
mount / vendor
mount -o rw, remount / vendor
cp /sdcard/fstab.angler / vendor / etc /
always error message, try different twrp and roms
error: that target is in read-only filesystem
via file manager in TWRP, a received error ERROR status code 1.
I have followed all the steps correctly, respecting roms, twrp, bootloader, vendor, radio ... etc
If anyone has a definitive guide I would appreciate it. Thank you very much
 

yesimxev

Senior Member
May 8, 2017
68
28
18
Hi, sorry for my bad English, but I have a problem
I can't do this step:
mount / vendor
mount -o rw, remount / vendor
cp /sdcard/fstab.angler / vendor / etc /
always error message, try different twrp and roms
error: that target is in read-only filesystem
via file manager in TWRP, a received error ERROR status code 1.
I have followed all the steps correctly, respecting roms, twrp, bootloader, vendor, radio ... etc
If anyone has a definitive guide I would appreciate it. Thank you very much
The definitive guide is already up :laugh:
Including
Code:
fastboot flash vendor vendor.squashfs
so you don't need those commands since nexmon fw and fstab is flashed through vendor image. Please use the steps provided in the post
 

arti2525

New member
Jul 3, 2019
3
0
1
thanks!!!!!

The definitive guide is already up :laugh:
Including
Code:
fastboot flash vendor vendor.squashfs
so you don't need those commands since nexmon fw and fstab is flashed through vendor image. Please use the steps provided in the post

Thanks for your answer, kali NetHunter 2020.4 is great, it could be installed without problems and the new tools like change boot image is great:laugh::laugh::laugh:
The query is if in monitor mode I am the only one who has a problem for deauthentication, I only tried it with wifite2 (kimocoder).
Just thank you for this work it is simply beautiful.
sorry for my bad English
 
Last edited:

yesimxev

Senior Member
May 8, 2017
68
28
18
Thanks for your answer, kali NetHunter 2020.4 is great, it could be installed without problems and the new tools like change boot image is great:laugh::laugh::laugh:
The query is if in monitor mode I am the only one who has a problem for deauthentication, I only tried it with wifite2 (kimocoder).
Just thank you for this work it is simply beautiful.
sorry for my bad English
You are right, I'll check latest wifite from @kimocoder see if it makes a difference.
Airodump way of capturing a handshake works out of the box, just make sure you do export LD_PRELOAD=/your_path_to_kalilibnexmon.so in both airodump and aireplay kali terminal windows.
 

grajek05

New member
Oct 28, 2020
3
0
1
whether it is possible to install nethunter with pixel experience instead of LineageOS 17.1 because the vendor breaks down automatically.
 

hostage_squid

Member
Mar 8, 2020
5
3
3
First of all, thank you to everyone for all the hard work put in to make this happen.
I have followed the instructions exactly, but I am having a problem capturing WPA handshakes.
I run
Code:
nexutil -m2
from an SU Android terminal, and then in the Kali chroot I'm running
Code:
sudo LD_PRELOAD=/system/lib64/kalilibnexmon.so airodump-ng -c 1 -w shell [SSID_NAME]
in one window, where [SSID_NAME] is the SSID of my access point, and
Code:
sudo LD_PRELOAD=/system/lib64/kalilibnexmon.so aireplay-ng -0 1 -a [MAC_ADDRESS] wlan0
in another window, where [MAC_ADDRESS] is the MAC address of my access point, and it works fine. The deauth packet is sent out (so packet injection seems to be working), and as soon as my other phone reconnects to the access point, the first window shows [WPA HANDSHAKE: ... ] in the top right corner of the screen. All looking good.

But when I try to open the CAP file in aircrack-ng it says no WPA handshakes are found, and when I open it in Wireshark it says the EAPOL packets are malformed. They seem to all be truncated to 86 bytes long. Anyone else experiencing this problem?

I can provide more in-depth logs if needed.