PDA

View Full Version : Nexus 9 - need help installing nethunter



musto
2016-01-29, 01:51
Dear Security Experts

I've purchased a Nexus 9 and would love to get Nethunter installed and working on it correctly without breaking the device.

From what I have seen online there aren't too many guides, and there seems to be a number of issues / reboot loops etc with what I have seen.

Would be grateful for any help and advice, in fact I'm even happy to pay an experienced consultant to help me with this.

Cheers
Musto

jcadduono
2016-01-30, 20:48
Nexus 9....that's flounder I take it.

STEP 1: UNLOCK YOUR DEVICE
Unlocking your device will typically wipe everything off your phone. Back up your data! (copying stuff off your internal storage to a computer is also advised in case anything goes wrong)
If your device is locked, you read this article to learn how to back up your data: http://android.stackexchange.com/questions/28296/full-backup-of-non-rooted-devices
(preferably use the adb backup method)
To unlock your device (applies to all Nexus devices): https://www.androidpit.com/how-to-unlock-nexus-5-bootloader

STEP 2: STAYING UP TO DATE
If you want a bug-free install, I would advise updating to your latest stock ROM.
At the moment, this appears to be: 6.0.1 (MMB29S)
https://developers.google.com/android/nexus/images?hl=en#volantis
If your device has LTE, please flash voltanisg, otherwise flash volantis.
The .tgz can be extracted, giving you a few files. flash-all.bat will flash the entire firmware to your device, assuming you set your tools up properly from step 1.
Ensure that you can boot and use your system without issues before proceeding to the next step!

STEP 3: INSTALL A CUSTOM RECOVERY
You will need to install TWRP. -> https://twrp.me/devices/htcnexus9.html
There are instructions on the linked page. You use the same tool you used in the unlock step.

STEP 4: BACK UP - AGAIN!
Your new custom recovery, TWRP, allows you to back up and restore your device with ease.
You probably want to create another backup if you like where you are already, and want the option to return to a system free of root or NetHunter.
Use the large buttons in TWRP interface to navigate and back up your system, data, and boot partition with ease.
Since TWRP is on its own recovery partition, it should be accessible no matter how bad your system gets messed up.

STEP 5: FLASH KALI NETHUNTER
You can download the latest (nightly) version of the Kali NetHunter installer here: https://forums.kali.org/showthread.php?29177-%28BETA%29-Kali-Nethunter-3-0-alternate-installer
(please read the thread, the instructions and cautions are there)

Good luck!

If you run into any issues, such as reboot loops like you've mentioned, please join us in IRC. #nethunter on freenode (https://webchat.freenode.net/?channels=nethunter)
We will do what we can do resolve your issues, as our goal is to make NetHunter stable on all supported devices.

PS. no need to pay me :P

Default
2016-02-02, 23:34
Hey Jcadduono,

I've been trying to install Nethunter 3.0 on my Nexus 9 as well but have had no luck. I'm on the latest firmware or was the latest since yesterday (MMB29S). Now MMB29R is out, so I'm assuming everyone will be updating to that.

First of all, I was on Stock and Rooted to prepare for the Nethunter installation. However, I read that you needed to Un-Root if you're using a Systemless Root since Nethunter doesn't play well with Systemless. So I flashed back to Stock Marshmallow and installed the latest TWRP 2.8.7.1 for the Tablet.

After flashing the Custom Recovery, I tried installing Nethunter in 3 different ways. I flashed the Official Nethunter 3.0 download and that didn't work. I also tried downloading the latest nightly and using the Beta Alternate Installer with and without the chroot-full zip. All 3 ways get the tablet stuck at the Kali Boot Screen and force me to flash back to stock.

There has to be something I'm doing wrong but I don't know what is causing Nethunter to not boot up. Is it something to do with not having a System Root beforehand or Busybox not being installed? I don't see busybox needed in the install instructions anymore since it's already included with Nethunter. Are there any other suggestions you can give or think of that could be causing this issue?

Once I get this working, I would like to create a thread on the Forums so other Nexus 9 owners don't run into the same problem.

jcadduono
2016-02-03, 02:35
Hey Jcadduono,

I've been trying to install Nethunter 3.0 on my Nexus 9 as well but have had no luck. I'm on the latest firmware or was the latest since yesterday (MMB29S). Now MMB29R is out, so I'm assuming everyone will be updating to that.

First of all, I was on Stock and Rooted to prepare for the Nethunter installation. However, I read that you needed to Un-Root if you're using a Systemless Root since Nethunter doesn't play well with Systemless. So I flashed back to Stock Marshmallow and installed the latest TWRP 2.8.7.1 for the Tablet.

After flashing the Custom Recovery, I tried installing Nethunter in 3 different ways. I flashed the Official Nethunter 3.0 download and that didn't work. I also tried downloading the latest nightly and using the Beta Alternate Installer with and without the chroot-full zip. All 3 ways get the tablet stuck at the Kali Boot Screen and force me to flash back to stock.

There has to be something I'm doing wrong but I don't know what is causing Nethunter to not boot up. Is it something to do with not having a System Root beforehand or Busybox not being installed? I don't see busybox needed in the install instructions anymore since it's already included with Nethunter. Are there any other suggestions you can give or think of that could be causing this issue?

Once I get this working, I would like to create a thread on the Forums so other Nexus 9 owners don't run into the same problem.

return to stock (and twrp) where you can boot fine. (make sure you can boot fine!) then flash in twrp:
https://idlekernel.com/nethunter/nightly/3.0.5-20160202-2121/kernel-only/kernel-nethunter-flounder-marshmallow-3.0.5-20160202-2121.zip

before booting, but after flashing, use copy log to sd in twrp advanced options. you will need this log to give to me in case it doesnt boot!

if it boots, awesome. move on to next step, otherwise get me the log. :)

--next step--
go back into twrp and flash:
https://idlekernel.com/nethunter/nightly/3.0.5-20160202-2121/chroot-full/update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160202-2121.zip

that will install the rest of nethunter. you might want to get another log just in case.

Default
2016-02-03, 16:42
return to stock (and twrp) where you can boot fine. (make sure you can boot fine!) then flash in twrp:
https://idlekernel.com/nethunter/nightly/3.0.5-20160202-2121/kernel-only/kernel-nethunter-flounder-marshmallow-3.0.5-20160202-2121.zip

before booting, but after flashing, use copy log to sd in twrp advanced options. you will need this log to give to me in case it doesnt boot!

if it boots, awesome. move on to next step, otherwise get me the log. :)

--next step--
go back into twrp and flash:
https://idlekernel.com/nethunter/nightly/3.0.5-20160202-2121/chroot-full/update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160202-2121.zip

that will install the rest of nethunter. you might want to get another log just in case.

Awesome, That Worked! I used the latest Stock Image MMB29R and TWRP 2.8.7.1

Only 2 problems:
1). It gives me the "Your Device is Corrupt" or Red Triangle message on each boot.
2). I can't boot into TWRP anymore, it just stays at the TeamWin Screen.

Normal Boot works fine. The device is Rooted and has Nethunter installed.

Here are the 2 logs in case anything went wrong:
Nexus 9 Kernel (http://paste.debian.net/378352)
Chroot-Full (http://paste.debian.net/378353)

With TWRP broken, is there another way to update Nethunter without starting the entire process over?
Also, is there a way to get rid of the Corrupt Message on Boot?

jcadduono
2016-02-04, 03:54
You will probably have to fastboot flash your stock system and boot partitions, then flash twrp again.

So you can't boot after flashing just the kernel zip? you never made that clear

try flashing just the generic zip after you have a working boot again, skip device specific. if generic works but kernel installer doesn't boot, then we have a kernel issue we need to fix on our end.

Default
2016-02-04, 17:33
After I flashed Stock and TWRP, I made sure everything booted up before flashing the kernel.
Then I flashed the kernel and rebooted. I copied the log just in case but the tablet booted up fine.

I then loaded back into TWRP, installed the chroot-full.zip, and grabbed another log just before rebooting.
The tablet booted into Nethunter after the chroot zip, but doesn't allow me to get back into TWRP.

I also get that "Your Device is Corrupt" error on every reboot, which I thought had something to do with the
boot.img not being patched properly? It starts after installing TWRP. I know flashing a custom kernel
or rooting the device usually fixes this, but the message still remains. While it's really not a big deal,
I would like to get rid of it.

Medic
2016-02-29, 15:34
jcaddunno: I also need help with my Nexus 9 (LTE running MMB29R). You reached out to me on IRC 2 days ago, and you gave me these 2 files (update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160224-0204 &
kernel-nethunter-flounder-marshmallow-3.0.5-20160224-0204)...If i'm using LRT, where should those files go, I put the first one in the "/nethunter-LRT/kaliNethunter". however I was unsure where to put the other zip "kernel-nethunter-flounder-marshmallow-3.0.5-20160224-0204". I am starting to think they should both be in that same folder...but I wanted to reach out to y'all for reassurance.

Here is what I did from terminal. (Also, the Nexus 9 does not fully reboots after some of these steps...It stays on the Unlooked Menu waiting for me to choose (HBOOT, Restart, Restart Fastboot, etc...) Thank You

root@Airborne:~# git clone https://github.com/offensive-security/nethunter-LRT.git
Cloning into 'nethunter-LRT'...
remote: Counting objects: 191, done.
remote: Total 191 (delta 0), reused 0 (delta 0), pack-reused 191
Receiving objects: 100% (191/191), 1.80 MiB | 0 bytes/s, done.
Resolving deltas: 100% (106/106), done.
Checking connectivity... done.
root@Airborne:~# cd nethunter-LRT/
root@Airborne:~/nethunter-LRT# ls
common.sh oemUnlock.sh stockNexusFlash.sh turtleme
kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
LICENSE stockImage superSu twrpImage
root@Airborne:~/nethunter-LRT# apt-get install android-tools-adb
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
android-tools-adb
0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded.
Need to get 75.5 kB of archives.
After this operation, 219 kB of additional disk space will be used.
Get:1 http://archive-7.kali.org/kali kali-rolling/main amd64 android-tools-adb amd64 5.1.1.r29-2 [75.5 kB]
Fetched 75.5 kB in 1s (67.7 kB/s)
Selecting previously unselected package android-tools-adb.
(Reading database ... 386391 files and directories currently installed.)
Preparing to unpack .../android-tools-adb_5.1.1.r29-2_amd64.deb ...
Unpacking android-tools-adb (5.1.1.r29-2) ...
Processing triggers for man-db (2.7.5-1) ...
Setting up android-tools-adb (5.1.1.r29-2) ...
root@Airborne:~/nethunter-LRT# apt-get install android-tools-fastboot
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
android-tools-fastboot
0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded.
Need to get 58.4 kB of archives.
After this operation, 154 kB of additional disk space will be used.
Get:1 http://archive-7.kali.org/kali kali-rolling/main amd64 android-tools-fastboot amd64 5.1.1.r29-2 [58.4 kB]
Fetched 58.4 kB in 0s (59.9 kB/s)
Selecting previously unselected package android-tools-fastboot.
(Reading database ... 386398 files and directories currently installed.)
Preparing to unpack .../android-tools-fastboot_5.1.1.r29-2_amd64.deb ...
Unpacking android-tools-fastboot (5.1.1.r29-2) ...
Processing triggers for man-db (2.7.5-1) ...
Setting up android-tools-fastboot (5.1.1.r29-2) ...
root@Airborne:~/nethunter-LRT# ls
common.sh oemUnlock.sh stockNexusFlash.sh turtleme
kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
LICENSE stockImage superSu twrpImage
root@Airborne:~/nethunter-LRT# cd stockImage/
root@Airborne:~/nethunter-LRT/stockImage# ls
root@Airborne:~/nethunter-LRT/stockImage# wget https://dl.google.com/dl/android/aosp/volantisg-mmb29r-factory-ac618374.tgz
--2016-02-28 09:41:13-- https://dl.google.com/dl/android/aosp/volantisg-mmb29r-factory-ac618374.tgz
Resolving dl.google.com (dl.google.com)... 173.194.39.14, 173.194.39.0, 173.194.39.1, ...
Connecting to dl.google.com (dl.google.com)|173.194.39.14|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1056289845 (1007M) [application/x-tar]
Saving to: ‘volantisg-mmb29r-factory-ac618374.tgz’

volantisg-mmb29r-fa 100%[===================>] 1007M 16.8MB/s in 62s

2016-02-28 09:42:16 (16.3 MB/s) - ‘volantisg-mmb29r-factory-ac618374.tgz’ saved [1056289845/1056289845]

root@Airborne:~/nethunter-LRT/stockImage# ls
volantisg-mmb29r-factory-ac618374.tgz
root@Airborne:~/nethunter-LRT/stockImage# cd ../
root@Airborne:~/nethunter-LRT# ls
common.sh oemUnlock.sh stockNexusFlash.sh turtleme
kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
LICENSE stockImage superSu twrpImage
root@Airborne:~/nethunter-LRT# cd twrpImage/
root@Airborne:~/nethunter-LRT/twrpImage# ls
root@Airborne:~/nethunter-LRT/twrpImage# wget https://dl.twrp.me/flounder/twrp-3.0.0-2-flounder.img.html
--2016-02-28 09:52:49-- https://dl.twrp.me/flounder/twrp-3.0.0-2-flounder.img.html
Resolving dl.twrp.me (dl.twrp.me)... 198.27.116.169
Connecting to dl.twrp.me (dl.twrp.me)|198.27.116.169|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 5251 (5.1K) [text/html]
Saving to: ‘twrp-3.0.0-2-flounder.img.html’

twrp-3.0.0-2-flound 100%[===================>] 5.13K --.-KB/s in 0s

2016-02-28 09:52:50 (177 MB/s) - ‘twrp-3.0.0-2-flounder.img.html’ saved [5251/5251]

root@Airborne:~/nethunter-LRT/twrpImage# ls
twrp-3.0.0-2-flounder.img.html
root@Airborne:~/nethunter-LRT/twrpImage# rm twrp-3.0.0-2-flounder.img.html
root@Airborne:~/nethunter-LRT/twrpImage# ls
root@Airborne:~/nethunter-LRT/twrpImage# wget https://dl.twrp.me/flounder/twrp-3.0.0-2-flounder.img
--2016-02-28 09:54:22-- https://dl.twrp.me/flounder/twrp-3.0.0-2-flounder.img
Resolving dl.twrp.me (dl.twrp.me)... 198.27.116.169
Connecting to dl.twrp.me (dl.twrp.me)|198.27.116.169|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 5251 (5.1K) [text/html]
Saving to: ‘twrp-3.0.0-2-flounder.img’

twrp-3.0.0-2-flound 100%[===================>] 5.13K --.-KB/s in 0s

2016-02-28 09:54:23 (204 MB/s) - ‘twrp-3.0.0-2-flounder.img’ saved [5251/5251]

root@Airborne:~/nethunter-LRT/twrpImage# ls
twrp-3.0.0-2-flounder.img
root@Airborne:~/nethunter-LRT/twrpImage# cd ../
root@Airborne:~/nethunter-LRT# cd superSu/
root@Airborne:~/nethunter-LRT/superSu# ls
root@Airborne:~/nethunter-LRT/superSu# ls
root@Airborne:~/nethunter-LRT/superSu# ls
root@Airborne:~/nethunter-LRT/superSu# wget http://click.xda-developers.com/api/click?format=go&jsonp=vglnk_145667540192612&key=f0a7f91912ae2b52e0700f73990eb321&libId=il6qpj9i01000n4o000DA6du24i35&loc=http%3A%2F%2Fforum.xda-developers.com%2Fapps%2Fsupersu%2F2014-09-02-supersu-v2-05-t2868133&v=1&out=http%3A%2F%2Fdownload.chainfire.eu%2F924%2FSup erSU%2FBETA-SuperSU-v2.68-20160228150503.zip&ref=http%3A%2F%2Fforum.xda-developers.com%2Fshowpost.php%3Fp%3D64161125%26pos tcount%3D3&title=%5BBETA%5D%5B2016.02.28%5D%20SuperSU%20v2.68&txt=BETA-SuperSU-v2.68-20160228150503.zip
[1] 5394
[2] 5395
[3] 5396
[4] 5397
[5] 5398
[6] 5399
[7] 5400
[8] 5401
[9] 5402
root@Airborne:~/nethunter-LRT/superSu# --2016-02-28 10:04:01-- http://click.xda-developers.com/api/click?format=go
Resolving click.xda-developers.com (click.xda-developers.com)... 52.30.233.197, 54.72.229.222
Connecting to click.xda-developers.com (click.xda-developers.com)|52.30.233.197|:80... connected.
HTTP request sent, awaiting response... 400 Bad Request
Cookie coming from click.xda-developers.com attempted to set domain to viglink.com
2016-02-28 10:04:01 ERROR 400: Bad Request.

^C
[1] Exit 8 wget http://click.xda-developers.com/api/click?format=go
[2] Done jsonp=vglnk_145667540192612
[3] Done key=f0a7f91912ae2b52e0700f73990eb321
[4] Done libId=il6qpj9i01000n4o000DA6du24i35
[5] Done loc=http%3A%2F%2Fforum.xda-developers.com%2Fapps%2Fsupersu%2F2014-09-02-supersu-v2-05-t2868133
[6] Done v=1
[7] Done out=http%3A%2F%2Fdownload.chainfire.eu%2F924%2FSup erSU%2FBETA-SuperSU-v2.68-20160228150503.zip
[8]- Done ref=http%3A%2F%2Fforum.xda-developers.com%2Fshowpost.php%3Fp%3D64161125%26pos tcount%3D3
[9]+ Done title=%5BBETA%5D%5B2016.02.28%5D%20SuperSU%20v2.68
root@Airborne:~/nethunter-LRT/superSu# ls
root@Airborne:~/nethunter-LRT/superSu# wget https://download.chainfire.eu/924/SuperSU/BETA-SuperSU-v2.68-20160228150503.zip?retrieve_file=1
--2016-02-28 10:04:52-- https://download.chainfire.eu/924/SuperSU/BETA-SuperSU-v2.68-20160228150503.zip?retrieve_file=1
Resolving download.chainfire.eu (download.chainfire.eu)... 5.79.66.53
Connecting to download.chainfire.eu (download.chainfire.eu)|5.79.66.53|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 4311027 (4.1M) [application/octet-stream]
Saving to: ‘BETA-SuperSU-v2.68-20160228150503.zip?retrieve_file=1’

BETA-SuperSU-v2.68- 100%[===================>] 4.11M 1.42MB/s in 2.9s

2016-02-28 10:04:56 (1.42 MB/s) - ‘BETA-SuperSU-v2.68-20160228150503.zip?retrieve_file=1’ saved [4311027/4311027]

root@Airborne:~/nethunter-LRT/superSu# ls
BETA-SuperSU-v2.68-20160228150503.zip?retrieve_file=1
root@Airborne:~/nethunter-LRT/superSu# rm BETA-SuperSU-v2.68-20160228150503.zip\?retrieve_file\=1
root@Airborne:~/nethunter-LRT/superSu# ls

Medic
2016-02-29, 15:36
root@Airborne:~/nethunter-LRT/superSu# ls
BETA-SuperSU-v2.68-20160228150503.zip
root@Airborne:~/nethunter-LRT/superSu# cd ../
root@Airborne:~/nethunter-LRT# ls
common.sh oemUnlock.sh stockNexusFlash.sh turtleme
kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
LICENSE stockImage superSu twrpImage
root@Airborne:~/nethunter-LRT# cd kaliNethunter/
root@Airborne:~/nethunter-LRT/kaliNethunter# cp /root/Desktop/update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160224-0204.zip /root/nethunter-LRT/kaliNethunter/update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160224-0204.zip
root@Airborne:~/nethunter-LRT/kaliNethunter# ls
update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160224-0204.zip
root@Airborne:~/nethunter-LRT/kaliNethunter# cd ../
root@Airborne:~/nethunter-LRT# ls
common.sh oemUnlock.sh stockNexusFlash.sh turtleme
kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
LICENSE stockImage superSu twrpImage
root@Airborne:~/nethunter-LRT# ./oemUnlock.sh
NETHUNTER LINUX FLASH (OEM UNLOCK)

NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

CHECKING PRE-REQUISITES

Checking if adb is installed
adb FOUND
Checking if adb is installed DONE

Checking if fastboot is installed
fastboot FOUND
Checking if fastboot is installed DONE

Adb connection check
ADB DEVICE NOT DETECTED!!!
Aborting.
root@Airborne:~/nethunter-LRT# ./oemUnlock.sh
NETHUNTER LINUX FLASH (OEM UNLOCK)

NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

CHECKING PRE-REQUISITES

Checking if adb is installed
adb FOUND
Checking if adb is installed DONE

Checking if fastboot is installed
fastboot FOUND
Checking if fastboot is installed DONE

Adb connection check
ADB device detected.
Adb connection check DONE

CHECKING PRE-REQUISITES DONE

Rebooting into bootloader
Rebooting into bootloader DONE

Starting OEM UNLOCK
This needs you interaction. Check phone screen.
...
(bootloader) ability is 1
(bootloader) Device stete is unlock already
OKAY [ 0.141s]
finished. total time: 0.142s
OEM UNLOCK DONE

Rebooting the phone
resuming boot...
FAILED (remote: not allowed)
finished. total time: 0.000s
Rebooting the phone DONE

It can take a bit to boot up, dont worry. ^^

You will need to enable developer options and USB debugging again.

You can flash a stock rom using stockFlash.sh (Not needed if you are in latest android version)
or continue flashing TWRP && superSU && Kali Nethunter using twrpFlash.sh script

root@Airborne:~/nethunter-LRT# cd stockImage/
root@Airborne:~/nethunter-LRT/stockImage# ls
volantisg-mmb29r-factory-ac618374.tgz
root@Airborne:~/nethunter-LRT/stockImage# cd ../

root@Airborne:~/nethunter-LRT# ls
common.sh oemUnlock.sh stockNexusFlash.sh turtleme
kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
LICENSE stockImage superSu twrpImage
root@Airborne:~/nethunter-LRT# ./stockNexusFlash.sh
NETHUNTER LINUX FLASH (STOCK NEXUS GOOGLE IMAGES)

NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

CHECKING PRE-REQUISITES

Checking if adb is installed
adb FOUND
Checking if adb is installed DONE

Checking if fastboot is installed
fastboot FOUND
Checking if fastboot is installed DONE

Adb connection check
ADB DEVICE NOT DETECTED!!!
Aborting.
root@Airborne:~/nethunter-LRT# ./stockNexusFlash.sh
NETHUNTER LINUX FLASH (STOCK NEXUS GOOGLE IMAGES)

NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

CHECKING PRE-REQUISITES

Checking if adb is installed
adb FOUND
Checking if adb is installed DONE

Checking if fastboot is installed
fastboot FOUND
Checking if fastboot is installed DONE

Adb connection check
ADB device detected.
Adb connection check DONE

Checking if tar is installed
tar FOUND
Checking if tar is installed DONE

Checking stock image existence
Dir stockImage/ has files
Checking stock rom existence DONE

CHECKING PRE-REQUISITES DONE

Creating tmp dir _extracted
Creating tmp dir _extracted DONE

Extracting stockImage/volantisg-mmb29r-factory-ac618374.tgz
volantisg-mmb29r/
volantisg-mmb29r/image-volantisg-mmb29r.zip
volantisg-mmb29r/flash-all.bat
volantisg-mmb29r/bootloader-flounder_lte-3.48.0.0135.img
volantisg-mmb29r/flash-all.sh
volantisg-mmb29r/flash-base.sh
EXTACTING stockImage/volantisg-mmb29r-factory-ac618374.tgz DONE

cd to _extracted
cd to _extracted DONE

Rebooting into bootloader
Rebooting into bootloader DONE

Flasing Stock Rom
!!!! DONT UNPLUG THE DEVICE !!!!
target reported max download size of 518205818 bytes
sending 'bootloader' (2898 KB)...
OKAY [ 0.211s]
writing 'bootloader'...
(bootloader) Device State : Unlocked
(bootloader) zip header checking...
(bootloader) shift signature_size for header checking...
(bootloader) zip info parsing...
(bootloader) checking model ID...
(bootloader) start image[hboot] unzipping for pre-update check...
(bootloader) start image unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[mts_preboot_prod] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[mts_prod] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[hboot] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[nvtboot] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[nvtbootwb0] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[tos] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[sp1] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[gp1] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[pt] unzipping & flashing...
(bootloader) ...... Successful
OKAY [ 5.533s]
finished. total time: 5.744s
rebooting into bootloader...
OKAY [ 0.029s]
finished. total time: 0.079s
target reported max download size of 518205818 bytes
archive does not contain 'boot.sig'
archive does not contain 'recovery.sig'
error: update package missing system.img
Flasing Stock Rom DONE

Deleting tmp dir _extracted
Deleting _extracted DONE

The device should be rebooting, once it is booted,
do the initial setup, enable developer options and USB debugging again.

Next step is flashing TWRP && superSU && Kali Nethunter using twrpFlash.sh script

root@Airborne:~/nethunter-LRT# ./stockNexusFlash.sh
NETHUNTER LINUX FLASH (STOCK NEXUS GOOGLE IMAGES)

NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

CHECKING PRE-REQUISITES

Checking if adb is installed
adb FOUND
Checking if adb is installed DONE

Checking if fastboot is installed
fastboot FOUND
Checking if fastboot is installed DONE

Adb connection check
ADB device detected.
Adb connection check DONE

Checking if tar is installed
tar FOUND
Checking if tar is installed DONE

Checking stock image existence
Dir stockImage/ has files
Checking stock rom existence DONE

CHECKING PRE-REQUISITES DONE

Creating tmp dir _extracted
Creating tmp dir _extracted DONE

Extracting stockImage/volantisg-mmb29r-factory-ac618374.tgz
volantisg-mmb29r/
volantisg-mmb29r/image-volantisg-mmb29r.zip
volantisg-mmb29r/flash-all.bat
volantisg-mmb29r/bootloader-flounder_lte-3.48.0.0135.img
volantisg-mmb29r/flash-all.sh
volantisg-mmb29r/flash-base.sh
EXTACTING stockImage/volantisg-mmb29r-factory-ac618374.tgz DONE

cd to _extracted
cd to _extracted DONE

Rebooting into bootloader
Rebooting into bootloader DONE

Flasing Stock Rom
!!!! DONT UNPLUG THE DEVICE !!!!
target reported max download size of 518205818 bytes
sending 'bootloader' (2898 KB)...
OKAY [ 0.212s]
writing 'bootloader'...
(bootloader) Device State : Unlocked
(bootloader) zip header checking...
(bootloader) shift signature_size for header checking...
(bootloader) zip info parsing...
(bootloader) checking model ID...
(bootloader) start image[hboot] unzipping for pre-update check...
(bootloader) start image[bct] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[mts_preboot_prod] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[mts_prod] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[hboot] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[nvtboot] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[nvtbootwb0] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[tos] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[sp1] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[gp1] unzipping & flashing...
(bootloader) ...... Successful
(bootloader) start image[pt] unzipping & flashing...
(bootloader) ...... Successful
OKAY [ 5.550s]
finished. total time: 5.762s
rebooting into bootloader...
OKAY [ 0.029s]
finished. total time: 0.079s
target reported max download size of 518205818 bytes
archive does not contain 'boot.sig'
archive does not contain 'recovery.sig'
[B]error: update package missing system.img
Flasing Stock Rom DONE

Deleting tmp dir _extracted
Deleting _extracted DONE

The device should be rebooting, once it is booted,
do the initial setup, enable developer options and USB debugging again.

Next step is flashing TWRP && superSU && Kali Nethunter using twrpFlash.sh script

Medic
2016-02-29, 15:39
root@Airborne:~/nethunter-LRT# ./twrpFlash.sh
NETHUNTER LINUX FLASH (TWRP, SuperSU and Kali Nethunter)

CHECKING PRE-REQUISITES

Checking if adb is installed
adb FOUND
Checking if adb is installed DONE

Checking if fastboot is installed
fastboot FOUND
Checking if fastboot is installed DONE

Adb connection check
ADB device detected.
Adb connection check DONE

Checking TWRP image existence
Dir twrpImage/ has files
Checking TWRP image existence DONE

Checking SuperSu existence
Dir superSu/ has files
Checking SuperSu existence DONE

Checking Kali Nethunter zip existence
Dir kaliNethunter/ has files
Checking Kali Nethunter zip existence DONE

CHECKING PRE-REQUISITES DONE

Sending Kali Nethunter zip to the device
Transferring: 754045600/754045600 (100%)
7660 KB/s (754045600 bytes in 96.128s)
Sending Kali Nethunter zip to the device DONE

Sending SuperSu zip to the device
Transferring: 4311027/4311027 (100%)
7927 KB/s (4311027 bytes in 0.531s)
Sending SuperSu zip to the device DONE

Rebooting into bootloader
Rebooting into bootloader DONE

Flashing TWRP image
target reported max download size of 518205818 bytes
sending 'recovery' (5 KB)...
OKAY [ 0.053s]
writing 'recovery'...
(bootloader) Device State : Unlocked
FAILED (remote: image error! (BootMagic check fail))
finished. total time: 0.473s
Flashing TWRP image DONE

Booting into TWRP (20 secs dont worry)
creating boot image...
creating boot image - 8192 bytes
downloading 'boot.img'...
OKAY [ 0.043s]
booting...
OKAY [ 0.167s]
finished. total time: 0.210s
Booting into TWRP DONE

Installing SuperSU
error: device not found
Installing SuperSU DONE!

Installing Kali Linux Nethunter
error: device not found
Installing Kali Linux Nethunter DONE!
Rebooting into Kali Linux Nethunter
error: device not found
Everything is installed. Phone should be booting up! Enjoy

root@Airborne:~/nethunter-LRT#

Phreya
2016-02-29, 16:38
@Medic, you don't need to use the LRT option. If you're already rooted and have TWRP set up, just get those 2 files JC linked and flash them via TWRP. It's an easy to use GUI, I'm sure you will understand how to use it :)

Turin
2016-03-09, 21:59
Dear Security Experts

I've purchased a Nexus 9 and would love to get Nethunter installed and working on it correctly without breaking the device.

From what I have seen online there aren't too many guides, and there seems to be a number of issues / reboot loops etc with what I have seen.

Would be grateful for any help and advice, in fact I'm even happy to pay an experienced consultant to help me with this.

Cheers
Musto

My advise to you is to skip nethunter 3. Use Nethunter 2 and lolipop 5.01. I dont know a single person who has been able to make nethunter 3 work on a nexus 9 using marshmellow. I have not yet tried nethunter 3 on lolipop though. Might work.

Medic
2016-03-20, 22:54
My advise to you is to skip nethunter 3. Use Nethunter 2 and lolipop 5.01. I dont know a single person who has been able to make nethunter 3 work on a nexus 9 using marshmellow. I have not yet tried nethunter 3 on lolipop though. Might work.

I got my Nexus 9 LTE "Marshmallow" running Great....I just needed a little extra guidance (As Phreya & Jcadduono can attest to ;) ) - Thanks Guys

It is fairly simple and straight forward once you understand what you are doing...I was new to android flashing, rooting, etc - so I had a bit of a learning curve

Turin
2016-03-22, 15:34
I got my Nexus 9 LTE "Marshmallow" running Great....I just needed a little extra guidance (As Phreya & Jcadduono can attest to ;) ) - Thanks Guys

It is fairly simple and straight forward once you understand what you are doing...I was new to android flashing, rooting, etc - so I had a bit of a learning curve

as of build mmb29v i have also been able to make it work, but not on any previous builds.

Default
2016-04-22, 00:21
Just updated to MOB30D and the latest TWRP 3.0.2-0

After everything booted up, I flashed today's Nightly 3.0.5-20160421-0440.

Here were my steps:
1). Boot into TWRP
2). Flash Kernel only (Wipe Cache & Dalvik Optional)
3). Reboot (Make sure Tablet boots up, then reboot into TWRP)
4). Flash Full Chroot (Wipe Cache & Dalvik Optional)
5). Reboot

Everything seems to be working. I still can't get back into TWRP after flashing the full chroot, but I am happy to say that the Corrupt Message on Boot is no longer there!

almodovaris
2016-05-09, 14:47
Just updated to MOB30D and the latest TWRP 3.0.2-0

After everything booted up, I flashed today's Nightly 3.0.5-20160421-0440.

Here were my steps:
1). Boot into TWRP
2). Flash Kernel only (Wipe Cache & Dalvik Optional)
3). Reboot (Make sure Tablet boots up, then reboot into TWRP)
4). Flash Full Chroot (Wipe Cache & Dalvik Optional)
5). Reboot

Everything seems to be working. I still can't get back into TWRP after flashing the full chroot, but I am happy to say that the Corrupt Message on Boot is no longer there!

Yes, this worked. I have a Nexus 9 LTE 32 GB. I did not install AOSP, nor TWRP. I started with a rooted, backed-up tablet and did the above (with the latest nightly available on the server).

A word of caution: if you want to crack WiFi, it won't work, since there is no driver supporting monitor mode for the WiFi card of the tablet. So, if you main use for Kali is cracking WiFi, don't install it.