Skip to content

Hijacker on the Samsung Galaxy S10 with wireless injection #1097

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

carlospolop
Copy link
Collaborator

🤖 Automated Content Update

This PR was automatically generated by the HackTricks News Bot based on a technical blog post.

📝 Source Information

🎯 Content Summary

Enabling 802.11 Packet Monitor and Injection on Galaxy S10

Overview: This post details how to enable 802.11 packet monitor and injection on the internal Broadcom BCM4375B1 Wi-Fi chipset of the Samsung Galaxy S10 by patching the firmware with NexMon and loading it through the Hijacker Android app, eliminating the need for external wireless adapters.

How it Works

NexMon provides patched firmware and driver hooks for Broadcom chips. The libnexmon....

🔧 Technical Details

Preloading the NexMon-patched firmware library (libnexmon.so) into the Broadcom Wi-Fi driver on Android via LD_PRELOAD hooks the driver’s function calls, enabling 802.11 monitor mode and packet injection on BCM4375B1 chipsets. The nexutil flags (-s0x613 -i -v2) configure the firmware’s injection capabilities, while svc wifi disable and ifconfig wlan0 up bring the interface into monitor mode.

Within a chrooted ...

🤖 Agent Actions

Added comprehensive coverage for enabling monitor mode & packet injection on Android Broadcom chipsets using NexMon and Hijacker:

  1. Created new technical guide:
    src/generic-methodologies-and-resources/pentesting-wifi/enable-nexmon-monitor-and-injection-on-android.md
    • Explains prerequisites, Magisk installation, Hijacker configuration, manual commands, Kali chroot usage, troubleshooting, and attack possibilities.
    • Provides all necessary command-line examples.
    • Includes references to the original blog post, NexMon, and Hijacker repos.

  2. Linked the new page from the Wi-Fi Pentesting README:
    src/generic-methodologies-and-resources/pentesting-wifi/README.md
    • Added “Hijacker & NexMon (Android internal Wi-Fi)” entry under Tools with proper {{#ref}} to the new file.

...

✅ Review Checklist

  • Content is technically accurate
  • Formatting follows HackTricks style guidelines
  • Links and references are working
  • Content adds educational value
  • No sensitive information is exposed

This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.

📚 Repository Maintenance

  • MD files processed: 849
  • MD files fixed: 3

All .md files have been checked for proper formatting (headers, includes, etc.).

@carlospolop
Copy link
Collaborator Author

🔗 Additional Context

Original Blog Post: https://forums.kali.org/t/hijacker-on-the-samsung-galaxy-s10-with-wireless-injection/10305

Content Categories: Based on the analysis, this content was categorized under "generic-methodologies-and-resources/pentesting-wifi/enable-nexmon-monitor-and-injection-on-android.md".

Repository Maintenance:

  • MD Files Formatting: 849 files processed (3 files fixed)

Review Notes:

  • This content was automatically processed and may require human review for accuracy
  • Check that the placement within the repository structure is appropriate
  • Verify that all technical details are correct and up-to-date
  • All .md files have been checked for proper formatting (headers, includes, etc.)

Bot Version: HackTricks News Bot v1.0

@carlospolop
Copy link
Collaborator Author

merge

@carlospolop carlospolop merged commit 8417945 into master Jul 13, 2025
@carlospolop carlospolop deleted the update_Hijacker_on_the_Samsung_Galaxy_S10_with_wireless_i_20250711_123906 branch July 13, 2025 18:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant