NetHunter is a Android penetration testing platform for Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there.
We’ve incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups. And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs. NetHunter is still in its infancy and we are looking forward to seeing this project and community grow.
The Kali NetHunter image is currently compatible with the following Nexus and OnePlus devices:
- Nexus 4 (GSM) – “mako”
- Nexus 5 (GSM/LTE) – “hammerhead”
- Nexus 7  (Wi-Fi) – “nakasi”
- Nexus 7  (Mobile) – “nakasig”
- Nexus 7  (Wi-Fi) – “razor”
- Nexus 7  (Mobile) – “razorg”
- Nexus 10 (Tablet) – “mantaray”
- OnePlus One 16 GB – “bacon”
- OnePlus One 64 GB – “bacon”
- Kali NetHunter runs within a chroot environment on the Android device so, for example, if you start an SSH server via an Android application, your SSH connection would connect to Android and not Kali Linux. This applies to all network services.
- When configuring payloads, the IP address field is the IP address of the system where you want the shell to return to. Depending on your scenario, you may want this address to be something other than the NetHunter.
- Due to the fact that the Android device is rooted, Kali NetHunter has access to all hardware, allowing you to connect USB devices such as wireless NICs directly to Kali using an OTG cable.