I’ve always been intrigued by computer security but I never had a lot of time to integrate the computer science and mathematics into it like the way I have with digital signal processing. In particular, I think I’d like to do a bit of research into wireless communication security. There’s no better way to learn than by doing, so I decided to experiment with Kali Linux and build my own penetration testing tablet. I was watching a Defcon video recently and someone mentioned something called a “Pwn pad”, a penetration testing tablet by PwnieExpress which comes bundled with Kali Linux Nethunter:
The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive Security. NetHunter supports Wireless 802.11 frame injection, one-click MANA Evil Access Point setups, HID keyboard (Teensy like attacks), as well asBadUSB MITM attacks – and is built upon the sturdy shoulders of the Kali Linux distribution and toolsets.
Why buy one when you can build one yourself? After scowering the internet for instructions (of which most were outdated or just didn’t work), I managed to create a concise set which worked for me. Of course, use the following instructions at your own discretion.
Team Win Recovery Project 184.108.40.206: twrp-220.127.116.11-manta.img
Kali Linux Nethunter 2.0 for Nexus 10 (Mantaray Kitkat) image http://images.kali.org/kali_linux_nethunter_2.0_mantaray_kitkat.zip
Hardware I use:
TL-WN722N High gain 150mb/s USB wifi adapter
SENA UD100 Industrial Bluetooth USB Adapter
Just a few basic steps to root and flash your Google Nexus 10 to use the Kali Linux Nethunter image.
- Transfer the Kali Linux image to the tablet
- Reboot your Nexus 10 into the bootloader screen by holding down both the volume buttons and the power button at the same time (3 buttons), hold until the bootscreen shows up. plug it into your computer
- From your terminal:
> sudo apt-get install android-tool-fastboot
> sudo fastboot oem unlock
- Select yes on the device by toggling the volume key and pressing power
> sudo fastboot flash recovery /path/to/twrp-18.104.22.168-manta.img
- Toggle the volume button to Recovery Mode and press power to select it. The TWRP screen will now load.
- At this point, I would make a backup through TWRP in case things don’t go as planned.
- Do a factory wipe through TWRP. Reboot, it will ask you if you want to install SuperSU, do so.
- Finish installing SU after setting up your tablet by opening the SuperSU application. I used TWRP to download and install the application, not Google play. Reboot into recovery mode, select install, and select the Kali Linx image.
These instructions are from memory. I messed around and tried a bunch of things on the internet that didn’t work since they were outdated, this should be the least amount of work to be done to get it running. Voila, here’s a picture of mine:
Post install list:
- apt-get update
- apt-get upgrade
- apt-get dist-upgrade
It comes with very recent versions of Python and g++ which was nice. Good luck and happy testing!