Kali Linux "NetHunter"

Turn Your Android Device into Hacking Weapons

Kali NetHunter'KALI Linux' is one of the progressed open source operating system comes packaged with a set of penetration testing, have publicized yesterday the release of a new Kali project, said as NetHunter that will run on a Google Nexus device. The division affords much of the power of Kali with the adding of a browser-driven collection of tools that may be used to launch attacks on wireless networks or on untried computers via a USB connection.

The security training company Offensive Security which presents world-class information security training and penetration testing services has maintained and financed the Kali Linux and it is an open source Debian-based operating system for penetration testing and forensics, it is covered with a set of penetration testing and network monitoring tools used for testing of software personal information and security.

In an interview with Ars on phone, Mati Aharoni developer and Offensive Security’s lead trainer told that other than Nexus family NetHunter can be unite to run on Andorid devices. “the reason we choose Nexus devices was the precise core sources we were able to get from Google”.

Supported Devices

The Kali NetHunter at present well-suited with the following Nexus devices:

Turn Your Android Device into Hacking Weapons

  • Nexus 4 (GSM) - “mako” - EXPERIMENTAL SUPPORT
  • Nexus 5 (GSM/LTE) - “hammerhead”
  • Nexus 7 [2012] (Wi-Fi) - “nakasi”
  • Nexus 7 [2012] (Mobile) - “nakasig”
  • Nexus 7 [2013] (Wi-Fi) - “razor”
  • Nexus 7 [2013] (Mobile) - “razorg”
  • Nexus 10 - “mantaray”

Functions that attracted those sources are like the low-level code for Wi-Fi and USB device connectivity which made some of NetHunter’s features possible. “Some of the features are core dependent so they won’t work on other devices,” Aharoni said.

Nexus users gets lots of power from Kali Linux NetHunter project, those operating the NetHunter penetration testing platform can too begin attacks together with BadUSB man-in-the-middle (MITM) networking attacks via USB human interface device (HID) and Teensy keyboard via HID style attacks, wireless 802.11 enclose injection, and can associate evil access points in a click.

“NetHunter figure support programmable HID keyboard attacks, (a-la-teensy), plus “BadUSB” network attacks, permit an attacker to simply MITM an innocent aim by just connecting their device to a computer USB port,” said the Offensive Security team. “In adding to these built in functions, there is entire set of native Kali Linux tools accessible for use, many of them are configurable during an easy web interface.”

As told before Nethunter at present accessible for Nexus devices only, but make for other Android devices are possibly on the way. It has a full Kali Linux toolset, plus support for software defined radio, self destruction and the capability to launch a Kali desktop VNC session on Nexus phone.

This tool is made for an insider threat— an attacker who has physical access to a device— or somebody who get access through social engineering, tailing etc.

On one side, install a reverse-HTTP tunnel to a remote workstation because Teensy Keyboard attacks on PCs can be used to automatically raise privileges on a Windows PC. On the otherside, BadUSB can compel a Windows PC to identify the USB-connected phone as a network adapter and re-route all the transfer of the PC throughout monitoring purposes.

The Kali NetHunter design interface helps users to simply run difficult design files through a local web interface, which jointly with 802.11 wireless injection and a pre-designed connect VPN service make it a “difficult network security tool or separate drop box – with Kali Linux on your hand wherever you go.”