- Introduction
- Base Images
- Virtualization
- USB
- Kali On ARM
- Acer Tegra Chromebook 13"
- ASUS Chromebook Flip
- BeagleBone Black
- Cubieboard 2
- Cubietruck
- CuBox
- CuBox-i4Pro
- EfikaMX
- Galaxy Note 10.1
- Gem PDA
- HP Chromebook
- MiniX
- NanoPi2
- ODROID U2
- ODROID-C1
- ODROID-XU3
- Raspberry Pi
- Raspberry Pi - Disk Encryption
- Raspberry Pi 2
- RIoTboard
- Samsung ChromeBook
- Samsung Chromebook 2
- SS808/MK808
- Trimslice
- USB Armory
- Utilite Pro
- Containers
- WSL
- Cloud
- Kali NetHunter Documentation
- NetHunter KeX Manager
- Building a New Device File
- Building NetHunter
- Installing NetHunter from Windows
- Installing NetHunter On the Gemini PDA
- Modifying the Kernel
- NetHunter Application - Csploit
- NetHunter Application - DriveDriod
- NetHunter Application - Keyboard
- NetHunter Application - Router Keygen
- NetHunter Application - Shodan
- NetHunter Application - Terminal
- NetHunter Application Update
- NetHunter BadUSB Attack
- NetHunter Chroot Manager
- NetHunter Components
- NetHunter Custom Commands
- NetHunter DuckHunter Attacks
- NetHunter Exploit Database SearchSploit
- NetHunter HID Keyboard Attacks
- NetHunter Home Screen
- NetHunter Kali Services
- NetHunter MAC Changer
- NetHunter Man In The Middle Framework
- NetHunter MANA Evil Access Point
- NetHunter Metasploit Payload Generator
- NetHunter Nmap Scan
- NetHunter VNC Manager
- Porting NetHunter to New Devices
- Testing Checklist
- Wireless Cards and NetHunter
- Kali Linux on Android
- The Android Hacking Landscape
- General Use
- Tools
- Troubleshooting
- Kali Development
- Public Packaging
- Building Custom Kali ISOs
- Generate an Updated Kali ISO
- Live Build a Custom Kali ISO
- ARM Cross-Compilation
- Custom Beaglebone Black Image
- Custom Chromebook Image
- Custom CuBox Image
- Custom EfikaMX Image
- Custom MK/SS808 Image
- Custom ODROID X2 U2 Image
- Custom Raspberry Pi Image
- Preparing a Kali Linux ARM chroot
- Rebuilding a Source Package
- Recompiling the Kali Linux Kernel
- Community
- Policy
Testing Checklist
Beginning a checklist for testing new devices:
Does it boot?
Did applications install and do they work?
- Android VNC
- BlueNMEA
- DriveDroid
- Hacker’s Keyboard
- Kali Nethunter Application
- RF Analyzer
- SuperSU (This is installed separately)
- Terminal Emulator
Check Settings > About Phone > Kernel Version - Does it say Kali?
Launch Kali Nethunter Application
- HID Keyboard Attack
- Can you update/write to config file
- Does it work?
- HID Keyboard Attack
Launcher Kali terminal shell
Metasploit
- Run commands: service postgresql start && service metasploit start
- Did it generate username/database?
- Run command: msfconsole
- Be patient, this can take 10 minutes or longer
- Run commands: service postgresql start && service metasploit start
Social Engineering Toolkit
External WiFi support
- Plugin device, run commands: ifconig wlan1 up && wifite
- Does wifite see wlan1?
- Run commands (assume wlan1 up): airmon-ng start wlan1 && airodump-ng mon0
- Check for errors
- Run kalimenu > Wireless attacks > kismet
- Plugin device, run commands: ifconig wlan1 up && wifite
Kalimenu