This is the next-gen Nethunter app, which acts as an installer, updater, and interface for the Kali Linux chroot.
You may want to build a version of the Nethunter application for testing or own peace of mind. Here's a quick guide on getting started.
Launch to welcome screen
Configure > SDK Manager > Launch Standalone SDK Manager
Select:
- SDK Tools
- SDK Platform-tools
- SDK Build-tools
- Android 6.0 (API 23) or latest
Install then accept the license. Once you have the SDK you may need to update it in the future but are good to go for now. Now we need to go back to welcome screen and download the Nethunter application source files:
Checkout the project from version control > Git >
Github Repository Url: https://github.com/offensive-security/nethunter-app.git
Parent Directory: [where you want to store files]
Directory Name:[nethunter-app]
This should load your new project.
When you first launch the program you may need to sync Gradle with your project. I usually use the icon with the green circle and down arrow in icon bar but you may also use File > Sync. Assuming you have no errors, you can easily build a test application.
If your device is connected to your computer then you can click Run > Run 'nethunter app' then click on your device. The emulator is not going to give you accurate results so its best to test only on the device. If you want an APK go to Build > Build apk.
A brief rundown of the files and folders:
androidwversionmanager <-- The app updater
nethunter-app
manifests
AndroidManifest.xml <-- Manages permissions among other things
java
com.team420.kekhunter <-- Contains the source for application
GPS <-- Handles NMEA data for chroot GPS
updateReceiver <-- For "run at boot service"
service <-- For "run at boot service"
utils <-- Misc system variables and shell executer. Controls Nethunter paths also
res
drawable <-- Icons and pictures
layout <-- The "gui" for each section of the app
menu <-- Small menus
values <-- Contains strings or "text" used by application
assets
etc.init.d <-- Startup scripts
files
nh_files <-- Copied to sdcard
deauth <-- Used by the Deauthenticator.
configs <-- Config files used by apps
duckscripts <-- Some default ducky scripts
modules <-- Mainly used by duckhunter. Contains keyseed.py which does all the HID work.
scripts <-- This is what launches chroot (bootkali) and checks services