[Kali_nethunter] Kali launches Android end penetration test system Nethunter

Source: Internet
Author: User
Tags home screen kali linux mitm attack

We have invested a lot of effort in developing a tool for testing the privacy and security of software, called Kali Linux. It is based on the Debian operating system and is planned and developed by offensive security, which combines the capabilities of penetration testing and network monitoring tools.

Today the Kali development team and offensive security released a new Kali project, called Nethunter, that runs on a Google Nexus device, adding a browser-driven device, It can initiate an attack over a USB connection on a wireless network or an unattended computer.

Nethunter is still in its early stages, but it has included a wireless network attack, a BADUSB man-in-the-middle attack--to monitor all network traffic by masquerading as a network adapter on a USB-connected phone, to launch keyboard attacks on the PC, to elevate Windows PC permissions, and more.

In a telephone interview, Ars,offensive Security's chief trainer and developer Mati Aharoni said that Nethunter, in addition to being able to run in the Nexus series, could be compiled and run on Android devices, " Part of the reason we chose Nexus devices is because we can get specific kernel source code from Google. " Mati Aharoni, a company developer, says Nethunter can be compiled and run on non-Nexus devices, with currently supported devices including Nexus 5, Nexus 7 (2012 and 2013), and Nexus 10.

These resources, such as the ability to support the connection of the underlying code for Wi-Fi and USB devices, enable some of the nethunte features to be applied. "Some features are not available on other devices because they are dependent on the kernel," Aharoni said. For example, wireless network injection cannot run, and keyboard and BADUSB attacks do not work. ”

Nethunter and Pwnie Express ' Pwnpad, Pwnphone use the same platform, but and Pwnie basically have nothing in common.

Although many of the features of Nethunter are implemented via the native server Apache-driven web interface, Aharoni says the web interface is just an interface for using this tool, and we need to develop a more appropriate Android app in the long run.

Official

http://nethunter.com/download/

http://www.offensive-security.com/kali-linux-nethunter-download/

List of supported devices

The Kali nethunter image is currently compatible with the following Nexus devices:

    • Nexus 4 (GSM) -"Mako"-experimental support
    • Nexus 5 (gsm/lte) -"Hammerhead"
    • Nexus 7 [+] (Wi-Fi) -"Nakasi"
    • Nexus 7 [Mobile] -"Nakasig"
    • Nexus 7 [+] (Wi-Fi) -"Razor"
    • Nexus 7 [Mobile] -"razorg"
    • Nexus Ten -"Mantaray"


Lock screen


and its a phone!

Nethunter Web Panel

Kali Menu

Nethunter Bad USB

Wifite

< Span class= "Caption-text" > < Span class= "Caption-wrapper" > nethunter Home screen

< Span class= "Caption-text" > < Span class= "Caption-wrapper" > /span>

< Span class= "Caption-text" > < Span class= "Caption-wrapper" > full Kali Desktop via VNC

< Span class= "Caption-text" > < Span class= "Caption-wrapper" > /span>

< Span class= "Caption-text" > < Span class= "Caption-wrapper" > < Span class= "Caption-text" >armitage on Nethunter

< Span class= "Caption-text" > < Span class= "Caption-wrapper" > < Span class= "Caption-text" >

Metasploit Professionaly-cable otg/charging Support

installation process

1, official website environmental requirements: N5 N7 n10 Android 4.4

2. Experimental equipment:

  • N7 Android 4.4.4
  • N7 Android 4.4.3
  • N5 nadroid 4.4.2

    3, Developer mode +usb debug + unlock +root (General brush The machine these must be done)

    5, install BusyBox + TWRP

    6, open MTP, Card Brush package import SDcard, after completion of the MTP (can also be used without MTP direct ADB pull in)

    7, use TWRP into recovery (reboot recovery), install ROM, wait half an hour on OK.

    First, a handsome desktop.

    BadUSB MITM Attack

    Rogue USB Man-in-the-middle attack: A device equipped with nethunter is plugged into the victim's computer, which can hijack the victim's traffic.

    Tcpdump monitoring (The default tcpdump is streamlined, you need to upload one yourself.) or enter Kali Shell) to perform tcpdump-i rndis0 ICMP

    The victim PC Gateway before the attack starts

    The victim PC gateway after the attack started

    Because there is a dual gateway now so does not like the official website to demonstrate that traffic directly to the malicious Gateway (10.0.0.1) but still go before the Gateway (192.168.1.1) so the hijacking failed. After the deletion of the network management before the effective. The hood feels that you can combine the following HID Keyboard Attack To set a timed script to perform the operation of the routing table (removing the original gateway).

    HID Keyboard Attack

    Keyboard hijacking attack: Smart Device forgery successful input device such as keyboard input malicious instructions. such as adding an administrator, rebound shell ...

    The following add the administrator's demo, because just disguised the keyboard so the lock screen is not possible.

    Also configure payload and listen too lazy to get it.

    Other features

    Function Menu

    Mana Forged Ap,dnsmasq,hostap,wifite (NIC reason, the wireless experiment is not successful, feel the SIM card only)

    Summarize

    Nethunter overall feeling compared to the Swiss Army knife said, brush to play can also, really expect him to do something valuable things to use the scene is very limited. There is really nothing to say, toss a period of time to share the experience and feelings written to everyone than those who have not thought and practice only from the official website to translate a few words stolen a few pictures come valuable

[Kali_nethunter] Kali launches Android end penetration test system Nethunter

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.