Results 1 to 16 of 16

Thread: Nexus 9 - need help installing nethunter

  1. #1
    Join Date
    2016-Jan
    Posts
    1

    Nexus 9 - need help installing nethunter

    Dear Security Experts

    I've purchased a Nexus 9 and would love to get Nethunter installed and working on it correctly without breaking the device.

    From what I have seen online there aren't too many guides, and there seems to be a number of issues / reboot loops etc with what I have seen.

    Would be grateful for any help and advice, in fact I'm even happy to pay an experienced consultant to help me with this.

    Cheers
    Musto
    Last edited by haken29a; 2016-01-29 at 03:52. Reason: Title

  2. #2
    Join Date
    2016-Jan
    Location
    on your WiFi, secure it!
    Posts
    31
    Nexus 9....that's flounder I take it.

    STEP 1: UNLOCK YOUR DEVICE
    Unlocking your device will typically wipe everything off your phone. Back up your data! (copying stuff off your internal storage to a computer is also advised in case anything goes wrong)
    If your device is locked, you read this article to learn how to back up your data: http://android.stackexchange.com/que...rooted-devices
    (preferably use the adb backup method)
    To unlock your device (applies to all Nexus devices): https://www.androidpit.com/how-to-un...s-5-bootloader

    STEP 2: STAYING UP TO DATE
    If you want a bug-free install, I would advise updating to your latest stock ROM.
    At the moment, this appears to be: 6.0.1 (MMB29S)
    https://developers.google.com/androi...hl=en#volantis
    If your device has LTE, please flash voltanisg, otherwise flash volantis.
    The .tgz can be extracted, giving you a few files. flash-all.bat will flash the entire firmware to your device, assuming you set your tools up properly from step 1.
    Ensure that you can boot and use your system without issues before proceeding to the next step!

    STEP 3: INSTALL A CUSTOM RECOVERY
    You will need to install TWRP. -> https://twrp.me/devices/htcnexus9.html
    There are instructions on the linked page. You use the same tool you used in the unlock step.

    STEP 4: BACK UP - AGAIN!
    Your new custom recovery, TWRP, allows you to back up and restore your device with ease.
    You probably want to create another backup if you like where you are already, and want the option to return to a system free of root or NetHunter.
    Use the large buttons in TWRP interface to navigate and back up your system, data, and boot partition with ease.
    Since TWRP is on its own recovery partition, it should be accessible no matter how bad your system gets messed up.

    STEP 5: FLASH KALI NETHUNTER
    You can download the latest (nightly) version of the Kali NetHunter installer here: https://forums.kali.org/showthread.p...nate-installer
    (please read the thread, the instructions and cautions are there)

    Good luck!

    If you run into any issues, such as reboot loops like you've mentioned, please join us in IRC. #nethunter on freenode
    We will do what we can do resolve your issues, as our goal is to make NetHunter stable on all supported devices.

    PS. no need to pay me :P
    Last edited by jcadduono; 2016-01-30 at 20:53.
    Member of the Kali NetHunter developer team. You can contribute to Kali NetHunter too!
    We accept pull requests!
    Find my GitHub account: jcadduono

  3. #3
    Join Date
    2016-Feb
    Posts
    5
    Hey Jcadduono,

    I've been trying to install Nethunter 3.0 on my Nexus 9 as well but have had no luck. I'm on the latest firmware or was the latest since yesterday (MMB29S). Now MMB29R is out, so I'm assuming everyone will be updating to that.

    First of all, I was on Stock and Rooted to prepare for the Nethunter installation. However, I read that you needed to Un-Root if you're using a Systemless Root since Nethunter doesn't play well with Systemless. So I flashed back to Stock Marshmallow and installed the latest TWRP 2.8.7.1 for the Tablet.

    After flashing the Custom Recovery, I tried installing Nethunter in 3 different ways. I flashed the Official Nethunter 3.0 download and that didn't work. I also tried downloading the latest nightly and using the Beta Alternate Installer with and without the chroot-full zip. All 3 ways get the tablet stuck at the Kali Boot Screen and force me to flash back to stock.

    There has to be something I'm doing wrong but I don't know what is causing Nethunter to not boot up. Is it something to do with not having a System Root beforehand or Busybox not being installed? I don't see busybox needed in the install instructions anymore since it's already included with Nethunter. Are there any other suggestions you can give or think of that could be causing this issue?

    Once I get this working, I would like to create a thread on the Forums so other Nexus 9 owners don't run into the same problem.

  4. #4
    Join Date
    2016-Jan
    Location
    on your WiFi, secure it!
    Posts
    31
    Quote Originally Posted by Default View Post
    Hey Jcadduono,

    I've been trying to install Nethunter 3.0 on my Nexus 9 as well but have had no luck. I'm on the latest firmware or was the latest since yesterday (MMB29S). Now MMB29R is out, so I'm assuming everyone will be updating to that.

    First of all, I was on Stock and Rooted to prepare for the Nethunter installation. However, I read that you needed to Un-Root if you're using a Systemless Root since Nethunter doesn't play well with Systemless. So I flashed back to Stock Marshmallow and installed the latest TWRP 2.8.7.1 for the Tablet.

    After flashing the Custom Recovery, I tried installing Nethunter in 3 different ways. I flashed the Official Nethunter 3.0 download and that didn't work. I also tried downloading the latest nightly and using the Beta Alternate Installer with and without the chroot-full zip. All 3 ways get the tablet stuck at the Kali Boot Screen and force me to flash back to stock.

    There has to be something I'm doing wrong but I don't know what is causing Nethunter to not boot up. Is it something to do with not having a System Root beforehand or Busybox not being installed? I don't see busybox needed in the install instructions anymore since it's already included with Nethunter. Are there any other suggestions you can give or think of that could be causing this issue?

    Once I get this working, I would like to create a thread on the Forums so other Nexus 9 owners don't run into the same problem.
    return to stock (and twrp) where you can boot fine. (make sure you can boot fine!) then flash in twrp:
    https://idlekernel.com/nethunter/nig...60202-2121.zip

    before booting, but after flashing, use copy log to sd in twrp advanced options. you will need this log to give to me in case it doesnt boot!

    if it boots, awesome. move on to next step, otherwise get me the log.

    --next step--
    go back into twrp and flash:
    https://idlekernel.com/nethunter/nig...60202-2121.zip

    that will install the rest of nethunter. you might want to get another log just in case.
    Member of the Kali NetHunter developer team. You can contribute to Kali NetHunter too!
    We accept pull requests!
    Find my GitHub account: jcadduono

  5. #5
    Join Date
    2016-Feb
    Posts
    5
    Quote Originally Posted by jcadduono View Post
    return to stock (and twrp) where you can boot fine. (make sure you can boot fine!) then flash in twrp:
    https://idlekernel.com/nethunter/nig...60202-2121.zip

    before booting, but after flashing, use copy log to sd in twrp advanced options. you will need this log to give to me in case it doesnt boot!

    if it boots, awesome. move on to next step, otherwise get me the log.

    --next step--
    go back into twrp and flash:
    https://idlekernel.com/nethunter/nig...60202-2121.zip

    that will install the rest of nethunter. you might want to get another log just in case.
    Awesome, That Worked! I used the latest Stock Image MMB29R and TWRP 2.8.7.1

    Only 2 problems:
    1). It gives me the "Your Device is Corrupt" or Red Triangle message on each boot.
    2). I can't boot into TWRP anymore, it just stays at the TeamWin Screen.

    Normal Boot works fine. The device is Rooted and has Nethunter installed.

    Here are the 2 logs in case anything went wrong:
    Nexus 9 Kernel
    Chroot-Full

    With TWRP broken, is there another way to update Nethunter without starting the entire process over?
    Also, is there a way to get rid of the Corrupt Message on Boot?
    Last edited by Default; 2016-02-03 at 17:49.

  6. #6
    Join Date
    2016-Jan
    Location
    on your WiFi, secure it!
    Posts
    31
    You will probably have to fastboot flash your stock system and boot partitions, then flash twrp again.

    So you can't boot after flashing just the kernel zip? you never made that clear

    try flashing just the generic zip after you have a working boot again, skip device specific. if generic works but kernel installer doesn't boot, then we have a kernel issue we need to fix on our end.
    Member of the Kali NetHunter developer team. You can contribute to Kali NetHunter too!
    We accept pull requests!
    Find my GitHub account: jcadduono

  7. #7
    Join Date
    2016-Feb
    Posts
    5
    After I flashed Stock and TWRP, I made sure everything booted up before flashing the kernel.
    Then I flashed the kernel and rebooted. I copied the log just in case but the tablet booted up fine.

    I then loaded back into TWRP, installed the chroot-full.zip, and grabbed another log just before rebooting.
    The tablet booted into Nethunter after the chroot zip, but doesn't allow me to get back into TWRP.

    I also get that "Your Device is Corrupt" error on every reboot, which I thought had something to do with the
    boot.img not being patched properly? It starts after installing TWRP. I know flashing a custom kernel
    or rooting the device usually fixes this, but the message still remains. While it's really not a big deal,
    I would like to get rid of it.

  8. #8
    Join Date
    2015-May
    Location
    Texas
    Posts
    11
    jcaddunno: I also need help with my Nexus 9 (LTE running MMB29R). You reached out to me on IRC 2 days ago, and you gave me these 2 files (update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160224-0204 &
    kernel-nethunter-flounder-marshmallow-3.0.5-20160224-0204)...If i'm using LRT, where should those files go, I put the first one in the "/nethunter-LRT/kaliNethunter". however I was unsure where to put the other zip "kernel-nethunter-flounder-marshmallow-3.0.5-20160224-0204". I am starting to think they should both be in that same folder...but I wanted to reach out to y'all for reassurance.

    Here is what I did from terminal. (Also, the Nexus 9 does not fully reboots after some of these steps...It stays on the Unlooked Menu waiting for me to choose (HBOOT, Restart, Restart Fastboot, etc...) Thank You

    root@Airborne:~# git clone https://github.com/offensive-security/nethunter-LRT.git
    Cloning into 'nethunter-LRT'...
    remote: Counting objects: 191, done.
    remote: Total 191 (delta 0), reused 0 (delta 0), pack-reused 191
    Receiving objects: 100% (191/191), 1.80 MiB | 0 bytes/s, done.
    Resolving deltas: 100% (106/106), done.
    Checking connectivity... done.
    root@Airborne:~# cd nethunter-LRT/
    root@Airborne:~/nethunter-LRT# ls
    common.sh oemUnlock.sh stockNexusFlash.sh turtleme
    kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
    LICENSE stockImage superSu twrpImage
    root@Airborne:~/nethunter-LRT# apt-get install android-tools-adb
    Reading package lists... Done
    Building dependency tree
    Reading state information... Done
    The following NEW packages will be installed:
    android-tools-adb
    0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded.
    Need to get 75.5 kB of archives.
    After this operation, 219 kB of additional disk space will be used.
    Get:1 http://archive-7.kali.org/kali kali-rolling/main amd64 android-tools-adb amd64 5.1.1.r29-2 [75.5 kB]
    Fetched 75.5 kB in 1s (67.7 kB/s)
    Selecting previously unselected package android-tools-adb.
    (Reading database ... 386391 files and directories currently installed.)
    Preparing to unpack .../android-tools-adb_5.1.1.r29-2_amd64.deb ...
    Unpacking android-tools-adb (5.1.1.r29-2) ...
    Processing triggers for man-db (2.7.5-1) ...
    Setting up android-tools-adb (5.1.1.r29-2) ...
    root@Airborne:~/nethunter-LRT# apt-get install android-tools-fastboot
    Reading package lists... Done
    Building dependency tree
    Reading state information... Done
    The following NEW packages will be installed:
    android-tools-fastboot
    0 upgraded, 1 newly installed, 0 to remove and 3 not upgraded.
    Need to get 58.4 kB of archives.
    After this operation, 154 kB of additional disk space will be used.
    Get:1 http://archive-7.kali.org/kali kali-rolling/main amd64 android-tools-fastboot amd64 5.1.1.r29-2 [58.4 kB]
    Fetched 58.4 kB in 0s (59.9 kB/s)
    Selecting previously unselected package android-tools-fastboot.
    (Reading database ... 386398 files and directories currently installed.)
    Preparing to unpack .../android-tools-fastboot_5.1.1.r29-2_amd64.deb ...
    Unpacking android-tools-fastboot (5.1.1.r29-2) ...
    Processing triggers for man-db (2.7.5-1) ...
    Setting up android-tools-fastboot (5.1.1.r29-2) ...
    root@Airborne:~/nethunter-LRT# ls
    common.sh oemUnlock.sh stockNexusFlash.sh turtleme
    kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
    LICENSE stockImage superSu twrpImage
    root@Airborne:~/nethunter-LRT# cd stockImage/
    root@Airborne:~/nethunter-LRT/stockImage# ls
    root@Airborne:~/nethunter-LRT/stockImage# wget https://dl.google.com/dl/android/aos...y-ac618374.tgz
    --2016-02-28 09:41:13-- https://dl.google.com/dl/android/aos...y-ac618374.tgz
    Resolving dl.google.com (dl.google.com)... 173.194.39.14, 173.194.39.0, 173.194.39.1, ...
    Connecting to dl.google.com (dl.google.com)|173.194.39.14|:443... connected.
    HTTP request sent, awaiting response... 200 OK
    Length: 1056289845 (1007M) [application/x-tar]
    Saving to: ‘volantisg-mmb29r-factory-ac618374.tgz’

    volantisg-mmb29r-fa 100%[===================>] 1007M 16.8MB/s in 62s

    2016-02-28 09:42:16 (16.3 MB/s) - ‘volantisg-mmb29r-factory-ac618374.tgz’ saved [1056289845/1056289845]

    root@Airborne:~/nethunter-LRT/stockImage# ls
    volantisg-mmb29r-factory-ac618374.tgz
    root@Airborne:~/nethunter-LRT/stockImage# cd ../
    root@Airborne:~/nethunter-LRT# ls
    common.sh oemUnlock.sh stockNexusFlash.sh turtleme
    kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
    LICENSE stockImage superSu twrpImage
    root@Airborne:~/nethunter-LRT# cd twrpImage/
    root@Airborne:~/nethunter-LRT/twrpImage# ls
    root@Airborne:~/nethunter-LRT/twrpImage# wget https://dl.twrp.me/flounder/twrp-3.0...under.img.html
    --2016-02-28 09:52:49-- https://dl.twrp.me/flounder/twrp-3.0...under.img.html
    Resolving dl.twrp.me (dl.twrp.me)... 198.27.116.169
    Connecting to dl.twrp.me (dl.twrp.me)|198.27.116.169|:443... connected.
    HTTP request sent, awaiting response... 200 OK
    Length: 5251 (5.1K) [text/html]
    Saving to: ‘twrp-3.0.0-2-flounder.img.html’

    twrp-3.0.0-2-flound 100%[===================>] 5.13K --.-KB/s in 0s

    2016-02-28 09:52:50 (177 MB/s) - ‘twrp-3.0.0-2-flounder.img.html’ saved [5251/5251]

    root@Airborne:~/nethunter-LRT/twrpImage# ls
    twrp-3.0.0-2-flounder.img.html
    root@Airborne:~/nethunter-LRT/twrpImage# rm twrp-3.0.0-2-flounder.img.html
    root@Airborne:~/nethunter-LRT/twrpImage# ls
    root@Airborne:~/nethunter-LRT/twrpImage# wget https://dl.twrp.me/flounder/twrp-3.0.0-2-flounder.img
    --2016-02-28 09:54:22-- https://dl.twrp.me/flounder/twrp-3.0.0-2-flounder.img
    Resolving dl.twrp.me (dl.twrp.me)... 198.27.116.169
    Connecting to dl.twrp.me (dl.twrp.me)|198.27.116.169|:443... connected.
    HTTP request sent, awaiting response... 200 OK
    Length: 5251 (5.1K) [text/html]
    Saving to: ‘twrp-3.0.0-2-flounder.img’

    twrp-3.0.0-2-flound 100%[===================>] 5.13K --.-KB/s in 0s

    2016-02-28 09:54:23 (204 MB/s) - ‘twrp-3.0.0-2-flounder.img’ saved [5251/5251]

    root@Airborne:~/nethunter-LRT/twrpImage# ls
    twrp-3.0.0-2-flounder.img
    root@Airborne:~/nethunter-LRT/twrpImage# cd ../
    root@Airborne:~/nethunter-LRT# cd superSu/
    root@Airborne:~/nethunter-LRT/superSu# ls
    root@Airborne:~/nethunter-LRT/superSu# ls
    root@Airborne:~/nethunter-LRT/superSu# ls
    root@Airborne:~/nethunter-LRT/superSu# wget http://click.xda-developers.com/api/...0228150503.zip
    [1] 5394
    [2] 5395
    [3] 5396
    [4] 5397
    [5] 5398
    [6] 5399
    [7] 5400
    [8] 5401
    [9] 5402
    root@Airborne:~/nethunter-LRT/superSu# --2016-02-28 10:04:01-- http://click.xda-developers.com/api/click?format=go
    Resolving click.xda-developers.com (click.xda-developers.com)... 52.30.233.197, 54.72.229.222
    Connecting to click.xda-developers.com (click.xda-developers.com)|52.30.233.197|:80... connected.
    HTTP request sent, awaiting response... 400 Bad Request
    Cookie coming from click.xda-developers.com attempted to set domain to viglink.com
    2016-02-28 10:04:01 ERROR 400: Bad Request.

    ^C
    [1] Exit 8 wget http://click.xda-developers.com/api/click?format=go
    [2] Done jsonp=vglnk_145667540192612
    [3] Done key=f0a7f91912ae2b52e0700f73990eb321
    [4] Done libId=il6qpj9i01000n4o000DA6du24i35
    [5] Done loc=http%3A%2F%2Fforum.xda-developers.com%2Fapps%2Fsupersu%2F2014-09-02-supersu-v2-05-t2868133
    [6] Done v=1
    [7] Done out=http%3A%2F%2Fdownload.chainfire.eu%2F924%2FSup erSU%2FBETA-SuperSU-v2.68-20160228150503.zip
    [8]- Done ref=http%3A%2F%2Fforum.xda-developers.com%2Fshowpost.php%3Fp%3D64161125%26pos tcount%3D3
    [9]+ Done title=%5BBETA%5D%5B2016.02.28%5D%20SuperSU%20v2.68
    root@Airborne:~/nethunter-LRT/superSu# ls
    root@Airborne:~/nethunter-LRT/superSu# wget https://download.chainfire.eu/924/Su...etrieve_file=1
    --2016-02-28 10:04:52-- https://download.chainfire.eu/924/Su...etrieve_file=1
    Resolving download.chainfire.eu (download.chainfire.eu)... 5.79.66.53
    Connecting to download.chainfire.eu (download.chainfire.eu)|5.79.66.53|:443... connected.
    HTTP request sent, awaiting response... 200 OK
    Length: 4311027 (4.1M) [application/octet-stream]
    Saving to: ‘BETA-SuperSU-v2.68-20160228150503.zip?retrieve_file=1’

    BETA-SuperSU-v2.68- 100%[===================>] 4.11M 1.42MB/s in 2.9s

    2016-02-28 10:04:56 (1.42 MB/s) - ‘BETA-SuperSU-v2.68-20160228150503.zip?retrieve_file=1’ saved [4311027/4311027]

    root@Airborne:~/nethunter-LRT/superSu# ls
    BETA-SuperSU-v2.68-20160228150503.zip?retrieve_file=1
    root@Airborne:~/nethunter-LRT/superSu# rm BETA-SuperSU-v2.68-20160228150503.zip\?retrieve_file\=1
    root@Airborne:~/nethunter-LRT/superSu# ls

  9. #9
    Join Date
    2015-May
    Location
    Texas
    Posts
    11
    root@Airborne:~/nethunter-LRT/superSu# ls
    BETA-SuperSU-v2.68-20160228150503.zip
    root@Airborne:~/nethunter-LRT/superSu# cd ../
    root@Airborne:~/nethunter-LRT# ls
    common.sh oemUnlock.sh stockNexusFlash.sh turtleme
    kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
    LICENSE stockImage superSu twrpImage
    root@Airborne:~/nethunter-LRT# cd kaliNethunter/
    root@Airborne:~/nethunter-LRT/kaliNethunter# cp /root/Desktop/update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160224-0204.zip /root/nethunter-LRT/kaliNethunter/update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160224-0204.zip
    root@Airborne:~/nethunter-LRT/kaliNethunter# ls
    update-nethunter-generic-armhf-kalifs-full-rolling-3.0.5-20160224-0204.zip
    root@Airborne:~/nethunter-LRT/kaliNethunter# cd ../
    root@Airborne:~/nethunter-LRT# ls
    common.sh oemUnlock.sh stockNexusFlash.sh turtleme
    kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
    LICENSE stockImage superSu twrpImage
    root@Airborne:~/nethunter-LRT# ./oemUnlock.sh
    NETHUNTER LINUX FLASH (OEM UNLOCK)

    NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

    CHECKING PRE-REQUISITES

    Checking if adb is installed
    adb FOUND
    Checking if adb is installed DONE

    Checking if fastboot is installed
    fastboot FOUND
    Checking if fastboot is installed DONE

    Adb connection check
    ADB DEVICE NOT DETECTED!!!
    Aborting.
    root@Airborne:~/nethunter-LRT# ./oemUnlock.sh
    NETHUNTER LINUX FLASH (OEM UNLOCK)

    NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

    CHECKING PRE-REQUISITES

    Checking if adb is installed
    adb FOUND
    Checking if adb is installed DONE

    Checking if fastboot is installed
    fastboot FOUND
    Checking if fastboot is installed DONE

    Adb connection check
    ADB device detected.
    Adb connection check DONE

    CHECKING PRE-REQUISITES DONE

    Rebooting into bootloader
    Rebooting into bootloader DONE

    Starting OEM UNLOCK
    This needs you interaction. Check phone screen.
    ...
    (bootloader) ability is 1
    (bootloader) Device stete is unlock already
    OKAY [ 0.141s]
    finished. total time: 0.142s
    OEM UNLOCK DONE

    Rebooting the phone
    resuming boot...
    FAILED (remote: not allowed)
    finished. total time: 0.000s
    Rebooting the phone DONE

    It can take a bit to boot up, dont worry. ^^

    You will need to enable developer options and USB debugging again.

    You can flash a stock rom using stockFlash.sh (Not needed if you are in latest android version)
    or continue flashing TWRP && superSU && Kali Nethunter using twrpFlash.sh script

    root@Airborne:~/nethunter-LRT# cd stockImage/
    root@Airborne:~/nethunter-LRT/stockImage# ls
    volantisg-mmb29r-factory-ac618374.tgz
    root@Airborne:~/nethunter-LRT/stockImage# cd ../

    root@Airborne:~/nethunter-LRT# ls
    common.sh oemUnlock.sh stockNexusFlash.sh turtleme
    kaliNethunter README.md stockOpoFlash.sh twrpFlash.sh
    LICENSE stockImage superSu twrpImage
    root@Airborne:~/nethunter-LRT# ./stockNexusFlash.sh
    NETHUNTER LINUX FLASH (STOCK NEXUS GOOGLE IMAGES)

    NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

    CHECKING PRE-REQUISITES

    Checking if adb is installed
    adb FOUND
    Checking if adb is installed DONE

    Checking if fastboot is installed
    fastboot FOUND
    Checking if fastboot is installed DONE

    Adb connection check
    ADB DEVICE NOT DETECTED!!!
    Aborting.
    root@Airborne:~/nethunter-LRT# ./stockNexusFlash.sh
    NETHUNTER LINUX FLASH (STOCK NEXUS GOOGLE IMAGES)

    NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

    CHECKING PRE-REQUISITES

    Checking if adb is installed
    adb FOUND
    Checking if adb is installed DONE

    Checking if fastboot is installed
    fastboot FOUND
    Checking if fastboot is installed DONE

    Adb connection check
    ADB device detected.
    Adb connection check DONE

    Checking if tar is installed
    tar FOUND
    Checking if tar is installed DONE

    Checking stock image existence
    Dir stockImage/ has files
    Checking stock rom existence DONE

    CHECKING PRE-REQUISITES DONE

    Creating tmp dir _extracted
    Creating tmp dir _extracted DONE

    Extracting stockImage/volantisg-mmb29r-factory-ac618374.tgz
    volantisg-mmb29r/
    volantisg-mmb29r/image-volantisg-mmb29r.zip
    volantisg-mmb29r/flash-all.bat
    volantisg-mmb29r/bootloader-flounder_lte-3.48.0.0135.img
    volantisg-mmb29r/flash-all.sh
    volantisg-mmb29r/flash-base.sh
    EXTACTING stockImage/volantisg-mmb29r-factory-ac618374.tgz DONE

    cd to _extracted
    cd to _extracted DONE

    Rebooting into bootloader
    Rebooting into bootloader DONE

    Flasing Stock Rom
    !!!! DONT UNPLUG THE DEVICE !!!!
    target reported max download size of 518205818 bytes
    sending 'bootloader' (2898 KB)...
    OKAY [ 0.211s]
    writing 'bootloader'...
    (bootloader) Device State : Unlocked
    (bootloader) zip header checking...
    (bootloader) shift signature_size for header checking...
    (bootloader) zip info parsing...
    (bootloader) checking model ID...
    (bootloader) start image[hboot] unzipping for pre-update check...
    (bootloader) start image[bct] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[mts_preboot_prod] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[mts_prod] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[hboot] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[nvtboot] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[nvtbootwb0] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[tos] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[sp1] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[gp1] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[pt] unzipping & flashing...
    (bootloader) ...... Successful
    OKAY [ 5.533s]
    finished. total time: 5.744s
    rebooting into bootloader...
    OKAY [ 0.029s]
    finished. total time: 0.079s
    target reported max download size of 518205818 bytes
    archive does not contain 'boot.sig'
    archive does not contain 'recovery.sig'
    error: update package missing system.img
    Flasing Stock Rom DONE

    Deleting tmp dir _extracted
    Deleting _extracted DONE

    The device should be rebooting, once it is booted,
    do the initial setup, enable developer options and USB debugging again.

    Next step is flashing TWRP && superSU && Kali Nethunter using twrpFlash.sh script

    root@Airborne:~/nethunter-LRT# ./stockNexusFlash.sh
    NETHUNTER LINUX FLASH (STOCK NEXUS GOOGLE IMAGES)

    NOTE: THIS WILL FACTORY RESET THE DEVICE (15 secs to cancel using 'ctrl + c')

    CHECKING PRE-REQUISITES

    Checking if adb is installed
    adb FOUND
    Checking if adb is installed DONE

    Checking if fastboot is installed
    fastboot FOUND
    Checking if fastboot is installed DONE

    Adb connection check
    ADB device detected.
    Adb connection check DONE

    Checking if tar is installed
    tar FOUND
    Checking if tar is installed DONE

    Checking stock image existence
    Dir stockImage/ has files
    Checking stock rom existence DONE

    CHECKING PRE-REQUISITES DONE

    Creating tmp dir _extracted
    Creating tmp dir _extracted DONE

    Extracting stockImage/volantisg-mmb29r-factory-ac618374.tgz
    volantisg-mmb29r/
    volantisg-mmb29r/image-volantisg-mmb29r.zip
    volantisg-mmb29r/flash-all.bat
    volantisg-mmb29r/bootloader-flounder_lte-3.48.0.0135.img
    volantisg-mmb29r/flash-all.sh
    volantisg-mmb29r/flash-base.sh
    EXTACTING stockImage/volantisg-mmb29r-factory-ac618374.tgz DONE

    cd to _extracted
    cd to _extracted DONE

    Rebooting into bootloader
    Rebooting into bootloader DONE

    Flasing Stock Rom
    !!!! DONT UNPLUG THE DEVICE !!!!
    target reported max download size of 518205818 bytes
    sending 'bootloader' (2898 KB)...
    OKAY [ 0.212s]
    writing 'bootloader'...
    (bootloader) Device State : Unlocked
    (bootloader) zip header checking...
    (bootloader) shift signature_size for header checking...
    (bootloader) zip info parsing...
    (bootloader) checking model ID...
    (bootloader) start image[hboot] unzipping for pre-update check...
    (bootloader) start image[bct] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[mts_preboot_prod] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[mts_prod] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[hboot] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[nvtboot] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[nvtbootwb0] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[tos] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[sp1] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[gp1] unzipping & flashing...
    (bootloader) ...... Successful
    (bootloader) start image[pt] unzipping & flashing...
    (bootloader) ...... Successful
    OKAY [ 5.550s]
    finished. total time: 5.762s
    rebooting into bootloader...
    OKAY [ 0.029s]
    finished. total time: 0.079s
    target reported max download size of 518205818 bytes
    archive does not contain 'boot.sig'
    archive does not contain 'recovery.sig'
    error: update package missing system.img
    Flasing Stock Rom DONE

    Deleting tmp dir _extracted
    Deleting _extracted DONE

    The device should be rebooting, once it is booted,
    do the initial setup, enable developer options and USB debugging again.

    Next step is flashing TWRP && superSU && Kali Nethunter using twrpFlash.sh script

  10. #10
    Join Date
    2015-May
    Location
    Texas
    Posts
    11
    root@Airborne:~/nethunter-LRT# ./twrpFlash.sh
    NETHUNTER LINUX FLASH (TWRP, SuperSU and Kali Nethunter)

    CHECKING PRE-REQUISITES

    Checking if adb is installed
    adb FOUND
    Checking if adb is installed DONE

    Checking if fastboot is installed
    fastboot FOUND
    Checking if fastboot is installed DONE

    Adb connection check
    ADB device detected.
    Adb connection check DONE

    Checking TWRP image existence
    Dir twrpImage/ has files
    Checking TWRP image existence DONE

    Checking SuperSu existence
    Dir superSu/ has files
    Checking SuperSu existence DONE

    Checking Kali Nethunter zip existence
    Dir kaliNethunter/ has files
    Checking Kali Nethunter zip existence DONE

    CHECKING PRE-REQUISITES DONE

    Sending Kali Nethunter zip to the device
    Transferring: 754045600/754045600 (100%)
    7660 KB/s (754045600 bytes in 96.128s)
    Sending Kali Nethunter zip to the device DONE

    Sending SuperSu zip to the device
    Transferring: 4311027/4311027 (100%)
    7927 KB/s (4311027 bytes in 0.531s)
    Sending SuperSu zip to the device DONE

    Rebooting into bootloader
    Rebooting into bootloader DONE

    Flashing TWRP image
    target reported max download size of 518205818 bytes
    sending 'recovery' (5 KB)...
    OKAY [ 0.053s]
    writing 'recovery'...
    (bootloader) Device State : Unlocked
    FAILED (remote: image error! (BootMagic check fail))
    finished. total time: 0.473s
    Flashing TWRP image DONE

    Booting into TWRP (20 secs dont worry)
    creating boot image...
    creating boot image - 8192 bytes
    downloading 'boot.img'...
    OKAY [ 0.043s]
    booting...
    OKAY [ 0.167s]
    finished. total time: 0.210s
    Booting into TWRP DONE

    Installing SuperSU
    error: device not found
    Installing SuperSU DONE!

    Installing Kali Linux Nethunter
    error: device not found
    Installing Kali Linux Nethunter DONE!
    Rebooting into Kali Linux Nethunter
    error: device not found
    Everything is installed. Phone should be booting up! Enjoy

    root@Airborne:~/nethunter-LRT#

  11. #11
    Join Date
    2016-Feb
    Posts
    114
    @Medic, you don't need to use the LRT option. If you're already rooted and have TWRP set up, just get those 2 files JC linked and flash them via TWRP. It's an easy to use GUI, I'm sure you will understand how to use it

  12. #12
    Join Date
    2015-Nov
    Posts
    10
    Quote Originally Posted by musto View Post
    Dear Security Experts

    I've purchased a Nexus 9 and would love to get Nethunter installed and working on it correctly without breaking the device.

    From what I have seen online there aren't too many guides, and there seems to be a number of issues / reboot loops etc with what I have seen.

    Would be grateful for any help and advice, in fact I'm even happy to pay an experienced consultant to help me with this.

    Cheers
    Musto
    My advise to you is to skip nethunter 3. Use Nethunter 2 and lolipop 5.01. I dont know a single person who has been able to make nethunter 3 work on a nexus 9 using marshmellow. I have not yet tried nethunter 3 on lolipop though. Might work.

  13. #13
    Join Date
    2015-May
    Location
    Texas
    Posts
    11
    Quote Originally Posted by Turin View Post
    My advise to you is to skip nethunter 3. Use Nethunter 2 and lolipop 5.01. I dont know a single person who has been able to make nethunter 3 work on a nexus 9 using marshmellow. I have not yet tried nethunter 3 on lolipop though. Might work.
    I got my Nexus 9 LTE "Marshmallow" running Great....I just needed a little extra guidance (As Phreya & Jcadduono can attest to ) - Thanks Guys

    It is fairly simple and straight forward once you understand what you are doing...I was new to android flashing, rooting, etc - so I had a bit of a learning curve

  14. #14
    Join Date
    2015-Nov
    Posts
    10
    Quote Originally Posted by Medic View Post
    I got my Nexus 9 LTE "Marshmallow" running Great....I just needed a little extra guidance (As Phreya & Jcadduono can attest to ) - Thanks Guys

    It is fairly simple and straight forward once you understand what you are doing...I was new to android flashing, rooting, etc - so I had a bit of a learning curve
    as of build mmb29v i have also been able to make it work, but not on any previous builds.

  15. #15
    Join Date
    2016-Feb
    Posts
    5
    Just updated to MOB30D and the latest TWRP 3.0.2-0

    After everything booted up, I flashed today's Nightly 3.0.5-20160421-0440.

    Here were my steps:
    1). Boot into TWRP
    2). Flash Kernel only (Wipe Cache & Dalvik Optional)
    3). Reboot (Make sure Tablet boots up, then reboot into TWRP)
    4). Flash Full Chroot (Wipe Cache & Dalvik Optional)
    5). Reboot

    Everything seems to be working. I still can't get back into TWRP after flashing the full chroot, but I am happy to say that the Corrupt Message on Boot is no longer there!
    Last edited by Default; 2016-04-22 at 01:50.

  16. #16
    Join Date
    2016-May
    Posts
    3
    Quote Originally Posted by Default View Post
    Just updated to MOB30D and the latest TWRP 3.0.2-0

    After everything booted up, I flashed today's Nightly 3.0.5-20160421-0440.

    Here were my steps:
    1). Boot into TWRP
    2). Flash Kernel only (Wipe Cache & Dalvik Optional)
    3). Reboot (Make sure Tablet boots up, then reboot into TWRP)
    4). Flash Full Chroot (Wipe Cache & Dalvik Optional)
    5). Reboot

    Everything seems to be working. I still can't get back into TWRP after flashing the full chroot, but I am happy to say that the Corrupt Message on Boot is no longer there!
    Yes, this worked. I have a Nexus 9 LTE 32 GB. I did not install AOSP, nor TWRP. I started with a rooted, backed-up tablet and did the above (with the latest nightly available on the server).

    A word of caution: if you want to crack WiFi, it won't work, since there is no driver supporting monitor mode for the WiFi card of the tablet. So, if you main use for Kali is cracking WiFi, don't install it.

Similar Threads

  1. Looking for assistance installing NetHunter to Nexus 5X
    By RemixDeluxe in forum Installing NetHunter
    Replies: 7
    Last Post: 2018-02-17, 12:59
  2. Installing Nethunter om Nexus 6P
    By zoLx in forum Installing NetHunter
    Replies: 5
    Last Post: 2016-03-15, 05:15
  3. [problem] installing nethunter on NEXUS 10
    By petitradisgris in forum Installing NetHunter
    Replies: 0
    Last Post: 2015-08-23, 13:07

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •