Kali NetHunter is a free & Open-source Mobile Penetration Testing Platform for Android devices, based on Kali Linux
Tweet |
Kali NetHunter is a free & Open-source Mobile Penetration Testing Platform for Android devices, based on Kali Linux
OverviewKali NetHunter is available for un-rooted devices (NetHunter Rootless), for rooted devices that have a custom recovery (NetHunter Lite), and for rooted devices with custom recovery for which a NetHunter specific kernel is available (NetHunter). The core of Kali NetHunter, which is included in all three editions, comprises of:
Figure 2: Kali NetHunter Desktop Experience (KeX) outputting to an HDMI monitor The Kali NetHunter App Store can be accessed through the dedicated client app or via the web interface. Figure 3: Kali NetHunter App Store Both rooted editions provide additional tools & services. A custom kernel can extend that functionality by adding additional network and USB gadget drivers as well as wifi injection support for selected wifi chips. Figure 3: The Kali NetHunter App is available in both rooted editions (NetHunter Lite & NetHunter). Beyond the penetration testing tools included in Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and many more. For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. Kali NetHunter is an Open-source project developed by Offensive Security and the community. Kali NetHunter Application
|
|
Kali NetHunter is a free & Open-source Mobile Penetration Testing Platform for Android devices, based on Kali Linux
Kali Everywhere |
Overview
Kali NetHunter is available for un-rooted devices (NetHunter Rootless), for rooted devices that have a custom recovery (NetHunter Lite), and for rooted devices with custom recovery for which a NetHunter specific kernel is available (NetHunter).
The core of Kali NetHunter, which is included in all three editions, comprises of:
Kali Linux container that includes all the tools and applications that Kali Linux provides
Kali NetHunter App Store with dozens of purpose-built security apps
Android client to access the Kali NetHunter App Store
Kali NetHunter Desktop Experience (KeX) to run full Kali Linux desktop sessions with support for screen mirroring via HDMI or wireless screen casting
Figure 2: Kali NetHunter Desktop Experience (KeX) outputting to an HDMI monitor
The Kali NetHunter App Store can be accessed through the dedicated client app or via the web interface.
Figure 3: Kali NetHunter App Store
Both rooted editions provide additional tools & services. A custom kernel can extend that functionality by adding additional network and USB gadget drivers as well as wifi injection support for selected wifi chips.
Figure 3: The Kali NetHunter App is available in both rooted editions (NetHunter Lite & NetHunter).
Beyond the penetration testing tools included in Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and many more.
For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. Kali NetHunter is an Open-source project developed by Offensive Security and the community.
Kali NetHunter Application
- Home Screen - General information panel, network interfaces and HID device status.
- Kali Chroot Manager - For managing chroot metapackage installations.
- Kali Services - Start / stop various chrooted services. Enable or disable them at boot time.
- Custom Commands - Add your own custom commands and functions to the launcher.
- MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
- KeX Manager - Set up an instant VNC session with your Kali chroot.
- USB Arsenal - Control the USB gadget configurations
- HID Attacks - Various HID attacks, Teensy style.
- DuckHunter HID - Rubber Ducky style HID attacks
- BadUSB MITM Attack - Nuff said.
- MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button.
- Bluetooth Arsenal - Recon, spoof, listen to or inject audio to various Bluetooth devices.
- Social Engineer Toolkit - Build your own phishing email template for Social Engineer Toolkit.
- MITM Framework - Inject binary backdoors into downloaded executables on the fly.
- NMap Scan - Quick Nmap scanner interface.
- Metasploit Payload Generator - Generating Metasploit payloads on
0 Comments:
Post a Comment