Kali NetHunter Installation
Kali NetHunter Installation & Troubleshooting Log
Purpose: A comprehensive, copy-pasteable log/blog you can reference later or share with others. It covers the different NetHunter variants, exact steps for installing on supported Android phones, hardware requirements for full features (Wi‑Fi injection, USB HID/BadUSB, OTG), troubleshooting, and a buying checklist. Save this file to your notes or print it — keep it near your toolkit.
Quick Summary
NetHunter usually does not replace Android. Most phone installs run on top of Android (a Kali chroot/container) with a NetHunter app and optionally a custom kernel.
Full hardware features (Wi‑Fi injection, USB HID/BadUSB, advanced OTG) require a custom kernel specifically built for your phone model/codename.
Variants: Full (kernel-based), Lite (rooted but limited), Rootless (non-root, most limited). Choose based on whether you can unlock bootloader & flash kernels.
Table of contents
Variants explained (Full, Lite, Rootless)
Hardware & software requirements (what really matters)
Buying checklist (how to pick a phone)
Exact, generalized install flow (with commands & notes)
Preparation
Full (kernel-based) install flow
Magisk-based / Lite install flow
Rootless install flow
Post-install tests & verification
Common problems and fixes
Advanced: building your own kernel (brief notes)
Safety, ethics & backups
Useful commands reference (adb/fastboot/twrp/magisk)
Recommended devices (good starting list)
Appendix: quick checklist printout
1) Variants explained
Full (Kernel-based NetHunter)
What it is: Android remains the host OS, but you flash a device-specific NetHunter kernel (or a full NetHunter installer that includes a kernel). This enables kernel-level features like Wi‑Fi monitor/injection, USB HID gadgets (BadUSB), and more.
Pros: Best hardware support for pentest features. Most powerful.
Cons: Requires unlocking bootloader, flashing, and often voids warranty.
Lite (Rooted with NetHunter components)
What it is: Device is rooted (Magisk or equivalent), you install NetHunter components (chroot, app) and sometimes a Magisk module. Kernel may be unchanged or lightly modified.
Pros: Easier than full if a NetHunter kernel doesn't exist. Keeps many tools available.
Cons: Some kernel-level features may be unavailable.
Rootless (No root)
What it is: NetHunter tools run without root via user-space techniques. Easiest to install but most limited.
Pros: No unlocking, no voiding warranty, safe to try.
Cons: Very limited hardware features.
2) Hardware & software requirements (what affects Wi‑Fi injection, HID, OTG)
Device codename in official NetHunter list: If present, you’re far more likely to get full support.
Unlocked bootloader: Needed for most Full installs.
Kernel source availability / community kernels: If maintainers or community released kernels, you get injection/HID support more easily.
Wi‑Fi chipset: Built-in phone chipsets rarely support injection. Expect to use external USB Wi‑Fi adapters for reliable monitor/injection (USB OTG required).
USB OTG support & power: Device must support USB Host mode and supply enough power (or use powered USB hub) for adapters.
Magisk support: Useful for root management and some Magisk-module installs.
Storage & RAM: 64GB storage and 4GB+ RAM are fine for typical use; more is better for heavy tool use.
3) Buying checklist (basic & advanced checks)
✅ Model codename listed on NetHunter device/kernel list (primary requirement for Full features).
✅ Unlocked bootloader possible (check vendor/carrier policy).
✅ Active dev community (XDA / GitHub) for your model.
✅ USB OTG supported and confirmed by specs or user reports.
✅ Kernel sources released by vendor or community (or prebuilt NetHunter kernel available).
✅ External Wi‑Fi adapter compatibility (e.g., Alfa AWUS series often used for injection) if needed.
4) Exact, generalized install flow (commands & notes)
These are generalized commands. Replace
DEVICE_CODENAME,boot.img,nethunter.zip, and file names with the actual files for your device.
Preparation (do this first)
Backup everything. Unlocking bootloader often factory-resets device.
Install ADB & Fastboot on your PC (Linux/macOS/Windows WSL). Example (Ubuntu):
sudo apt update
sudo apt install adb fastbootEnable Developer Options & USB debugging on phone:
Settings → About phone → Tap Build number 7 times
Settings → System → Developer options → Enable USB debugging
Check device recognized by ADB
adb devices
# accept prompt on phone if shownReboot to bootloader / fastboot
adb reboot bootloader
# OR
adb reboot-bootloaderCheck fastboot device
fastboot devicesUnlock bootloader (WARNING: wipes device)
For many devices (e.g., Pixel):
fastboot flashing unlock
# or older devices: fastboot oem unlockFollow on-screen prompts on phone to confirm. This erases user data.
Full (kernel-based) NetHunter install — generalized steps
Use this if there is an official NetHunter image or kernel for your codename.
Find the official NetHunter image/installer for your codename (download the
nethunter-<device>.ziporkernel-<device>.img).Boot to custom recovery (TWRP) — if not installed, flash TWRP from fastboot:
fastboot flash recovery twrp-<device>.img
fastboot boot twrp-<device>.img # You can boot to it without flashing if you preferIn TWRP:
(Optional) Backup current ROM (TWRP
Backup) — save boot, system, vendor.Wipe data/cache if the installer requires it (read device-specific instructions).
Flash NetHunter installer zip (if provided):
Install→ choosenethunter-<device>.zip→ Swipe to flash.
OR flash a prebuilt kernel (
boot.img) using fastboot:
fastboot flash boot boot.img
fastboot rebootReboot to Android, install Magisk if required (some installers expect Magisk root), then install NetHunter app.
Use NetHunter app Chroot Manager to install or restore the Kali chroot (or use bundled chroot image). Follow the app prompts.
Post-install: Test kernel-level features (see next section).
Magisk-based / Lite install — generalized steps
Good when a full kernel installer does not exist, but you have root via Magisk.
Install Magisk (if not installed):
Patch boot image with Magisk and flash, or use the device-specific Magisk install steps.
Install NetHunter Magisk module (if provided for your device) or follow the NetHunter docs to install components.
Install NetHunter app and chroot via the app.
Test features — likely limited for HID/injection unless kernel already supports them.
Rootless install (no root)
Install NetHunter rootless app (or use the NetHunter Store / package for rootless).
Install the Kali chroot using user-space methods described in official docs (usually more limited).
Note: This is good for quick trials and learning tools but not for advanced hardware-level testing.
5) Post-install tests & verification (What to run and what 'pass' looks like)
Basic health checks
uname -a— confirm kernel version and any NetHunter kernel tags.NetHunter app → Check installed chroot version.
Wi‑Fi monitor / injection tests
If using built-in Wi‑Fi: run
iw listand look formonitormode support.For external USB adapter:
lsusbandiwconfig/ip link.Test injection (on a network you own or have permission to test!) with
aireplay-ng --testoraireplay-ng --test wlan0.
USB HID (BadUSB) test
Use
hid-gadget-testor appropriate scripts in NetHunter to emulate keyboard input. Confirm the device can send keystrokes to a target host.
USB OTG
Plug in a USB Ethernet or Wi‑Fi adapter and check
dmesg,ip a/ifconfigto see if it enumerates.
Kali tools
apt update && apt upgradeCheck Metasploit, nmap, etc.
msfconsole,nmap --version.
6) Common problems and fixes
Problem: Device not seen by fastboot/adb
Ensure USB debugging is enabled, try different USB cable/port, install OEM drivers (Windows), use
sudoon Linux.
Problem: Bootloader unlock option not available
Some carriers/devices lock bootloader. Check vendor website or community guides; some require an unlock token.
Problem: Wi‑Fi adapter not recognized or injection fails
Use a known-good adapter (Atheros/Realtek adapters favored for injection). Use a powered OTG hub if adapter needs power.
Ensure kernel modules for the chipset are present (
lsmod). If not, injection likely won't work.
Problem: TWRP won’t flash or device keeps bootlooping
Restore TWRP backup (if made) or re-flash stock boot via fastboot. Double-check device-specific patches.
Problem: NetHunter chroot install fails
Use
nethunter chrootlogs (the NetHunter app shows logs). Ensure sufficient storage and network connectivity.
Problem: Magisk or SafetyNet failure
Some installers require Magisk. Reinstall Magisk using the proper boot image and latest Magisk release.
7) Advanced: building your own kernel (brief notes)
Only do this if you are comfortable with Linux kernel development and cross-compiling.
Get kernel source for your device (from vendor/GitHub).
Set up cross-compile toolchain (aarch64/arm). Example toolchains:
gcc-aarch64-linux-gnu.Apply NetHunter patches or required driver patches.
Configure
.configusing device defconfig or upstream config.Compile, test by flashing boot image.
Building kernels is model-specific and can take a lot of trial-and-error. Keep a development phone or be ready to unbrick.
8) Safety, ethics & backups
Only test on networks and devices you own or have explicit permission to test. Unauthorized testing is illegal.
Always backup your data before unlocking or flashing.
Keep a copy of stock firmware and boot images to restore the device if needed.
9) Useful commands reference
# ADB
adb devices
adb reboot bootloader
adb reboot recovery
# Fastboot
fastboot devices
fastboot flashing unlock
fastboot flash boot boot.img
fastboot flash recovery twrp.img
fastboot reboot
# TWRP (use TWRP UI to flash zips)
# Magisk
# (Usually install Magisk via patched boot.img or TWRP)
# Linux tools inside Kali chroot
uname -a
lsusb
ip a
iwconfig
airmon-ng start wlan0
aireplay-ng --test wlan010) Recommended starter devices (typical community favorites)
Google Pixel series (Pixel 3 / 3a / 4 / 4a / 5 / 6) — developer-friendly, commonly supported.
OnePlus 6 / 6T / 7 / 8 series — good community support and kernels.
Poco F1 (beryllium) — popular with NetHunter Pro builds historically.
PinePhone / PinePhone Pro — if you want a Linux-first phone that can boot Linux from SD (not Android).
Note: Always confirm the specific codename for the exact device and check NetHunter’s device/kernel list for that codename.
11) Appendix: Quick checklist (print this)
If you get stuck:
Reproduce the exact error (copy/paste logs).
Check device-specific XDA/NetHunter threads. 3. Restore stock boot and recovery if needed. 4. Ask for help with the exact codename and error logs.
End of log — keep this as your portable NetHunter reference. If you want, I can convert this into a printable PDF, a step-by-step checklist file, or a shorter quick-start cheat sheet.
Last updated
Was this helpful?