NetHunter
The Kali NetHunter is an Android ROM overlay that includes a robust Mobile Penetration Testing Platform.[1] The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security.[2] The overlay includes a custom kernel, a Kali Linux chroot, and an accompanying Android application, which allows for easier interaction with various security tools and attacks. Beyond the penetration testing tools arsenal within Kali Linux, NetHunter also supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well as BadUSB MITM attacks [3]– and is built upon the sturdy shoulders of the Kali Linux distribution and tool sets. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. NetHunter is an open-source project developed by Offensive Security and the community.
NetHunter BadUSB Attack
Enabling this USB mode will turn your device with its OTG USB cable into a network interface when plugged into a target computer. Connecting the USB cable to a PC will force all traffic from that PC (Windows or Linux) through the NetHunter device, where the traffic can be MitM’d.[4]
MANA Evil Access Point
MANA is an evil access-point implementation by SensePost that performs rogue Wi-Fi AP and MitM attacks. The MitM logs get written to /var/lib/mana-toolkit/ in the Kali chroot.
MANA Attack Configuration
The default MANA configuration should work as-is however, you can tweak any of the available settings to match your target environment such as the ssid, channel number, etc.
Once everything is configured to your satisfaction, tap the Update button to save the configuration. Don't forget to press the menu button and start the attack.[5]
NetHunter HID Keyboard Attacks
The NetHunter HID Attacks turn your device and its OTG USB cable into a pre-programmed keyboard, able to type any given commands. Previously, only “Teensy” type devices were able to do this…but no longer! This attack generally works very well. However, if it becomes non-responsive, simply select Reset USB from the menu to freshen up the USB stack.[6]
References
- ↑ "offensive-security/kali-nethunter". GitHub. Retrieved 2016-03-08.
- ↑ "Kali Linux NetHunter". www.kali.org. 2014-08-29. Retrieved 2016-03-08.
- ↑ "Kali Linux NetHunter". www.kali.org. 2014-08-29. Retrieved 2016-03-08.
- ↑ "offensive-security/kali-nethunter". GitHub. Retrieved 2016-03-08.
- ↑ "offensive-security/nethunter-app". GitHub. Retrieved 2016-03-08.
- ↑ "offensive-security/kali-nethunter". GitHub. Retrieved 2016-03-08.