Skip to content
This repository has been archived by the owner on Apr 25, 2019. It is now read-only.
3boll edited this page Jan 8, 2016 · 111 revisions

Kali NetHunter Documentation

The Kali NetHunter is an Android ROM overlay that includes a robust Mobile Penetration Testing Platform. The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks. Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and much more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. NetHunter is an open-source project developed by Offensive Security and the community.

1.0 Supported Devices and ROMs

The following table lays out NetHunter supported hardware as well as the corresponding ROM or AOSP versions for which NetHunter is built:

Device AOSP Version Notes
Nexus 4 (mako) 5.1.1
Nexus 5 (hammerhead) 5.1.1 or 6.0.1
Nexus 6 (shamu) 5.1.1 or 6.0.1
Nexus 7 2012 (nakasi) 5.1.1
Nexus 7 2013 (razor) 5.1.1 or 6.0.1
Nexus 9 (volantis) 5.1.1 or 6.0.1
Nexus 10 (mantaray) 5.1.1
OnePlus One (bacon) CM 12.1 Our preferred device

2.0 Downloading NetHunter

NetHunter images for your specific supported device can be download from the Offensive Security NetHunter project page located at the following URL:

Once the zip file has downloaded, verify the SHA1 sum of the NetHunter zip image against the values on the Offensive Security NetHunter download page. If the SHA1 sums do not match, do not attempt to continue with the installation procedure.

3.0 Building NetHunter

Those of you who want to build a NetHunter image from our GitHub repository may do so using our Python build scripts. Check out our Building NetHunter page for more information.

4.0 Installing NetHunter on your Android

Now that you've either downloaded a NetHunter image or built one yourself, the next steps are to prepare your Android device and then install the image. "Preparing your Android device" includes:

  • unlocking your device and updating it to stock AOSP or CM in the case of OPO. (Check point 1.0 for supported roms)
  • Then root the device and install TWRP custom recovery.
  • Once rooted, all that remains is to flash the NetHunter image zip file onto your Android device.

4.1 Installing from Linux / OSX

Our preferred method for installing NetHunter on our devices using Linux or OSX involves using the NetHunter Linux Root Toolkit by @jmingov.

4.2 Installing from Windows

Alternatively, if you would like to preform the unlocking, flashing, and rooting from a Windows OS, you can use the Nexus Root Toolkit (for Nexus devices) and the Bacon Root Toolkit (for OnePlus One devices). For further instructions, check the Installing from Windows guide.

5.0 Post Installation Setup

  • Open the NetHunter App and start the Kali Chroot Manager.
  • Set up Hacker Keyboard.
  • Configure Kali Services, such as SSH.
  • Set up custom commands.
  • Initialize the Exploit Database.

6.0 Kali NetHunter Attacks and Features

####Kali NetHunter Application

####3rd Party Android Applications (WIP)

7.0 Porting NetHunter to New Devices:

If you're interested in porting NetHunter to other Android devices, check the following links. If your port works, make sure to tell us about it so we can include these kernels in our releases!

  1. Getting Started
  2. Modifying a Kernel
  3. Building a Device Script

8.0 Known Working Hardware:

  1. Wireless Cards
  2. SDR - RTL-SDR
  3. Bluetooth

NetHunter App:

  1. The NetHunter App can be found here