1
0
mirror of https://github.com/PrivSec-dev/privsec.dev synced 2024-12-23 05:11:34 -05:00
privsec.dev/content/posts/android/Installing Kali Nethunter Lite on DivestOS 20.0.md
Tommy b924a09b09
Fix publish date
Signed-off-by: Tommy <contact@tommytran.io>
2023-03-07 16:53:58 -05:00

3.3 KiB
Raw Blame History

title date tags author
Installing Kali NetHunter Lite on DivestOS 20.0 2023-03-07
Operating Systems
Android
Offensive Security
Tommy

This will turn your device into a purely penetration testing device, and it will be very insecure for any other purpose. Please do not do this on your daily driver.

This procedure should work without modification on many devices using the standard Android bootloader (not Samsung). However, every device has unique quirks that may require special attention.

Kali NetHunter Lite on a OnePlus 7T

Originally, I just needed a device to run packet capture on my other devices. I have a OnePlus 7T laying around which I am not using for anything (since it has already reached its end-of-life), so I thought it would be cool to give it a new purpose. I am using DivestOS here since it is my goto Android distribution, but you can use LineageOS or any other distribution if you want to.

Officially, Kali Nethunter only supports OxygenOS based on Android 10 or 11 on my device. However, since there is no security to be had anyways, I decided to have some fun and not do things by the book (their official documentation isn't accurate anyways, as I will explain).

Installing DivestOS

The installation procedure for DivestOS is fairly straightforward. First download the recovery and boot it using fastboot:

fastboot reboot /path/to/the/divestos/recovery.img
fastboot reboot recovery

DivestOS Recovery

Select Apply Update and Apply Update from ADB:

adb sideload /path/to/the/divestos.zip

Do not attempt to relock the bootloader --- we need to leave it unlocked to enable privileged access ("rooting") anyways. Do not reboot into the OS at this stage either.

Installing Magisk and disabling forceencrypt

The official documentation recommends TWRP and Disable_DmVerity_ForceEncrypt. However, TWRP doesn't exist for Android 12 and above for my device, and Disable_DmVerity_ForceEncrypt is deprecated and doesn't even work on Android 11.

Instead, we will use the LineageOS recovery (which allows flashing files with arbitrary signatures) and Disable Force Encryption NEO.

First, reboot the device into the bootloader.

Then, you need to download the LineageOS Recovery for your device and boot into it:

fastboot reboot /path/to/the/lineageos/recovery.img

Next, you just need to do ADB sideload for Disable Force Encryption NEO. It will give you the option to install Magisk and disable forceencrypt, and choose yes on both. The rest of the options are up to you - they are not very important.

Installing Kali Nethunter Lite

Reboot into your OS and set it up normally. Make sure that encryption is disabled:

Kali Nethunter Encryption

Finally, download the appropriate build for Nethunter and flash it as a Magisk module in the Magisk Manager.

Happy NetHunting!