Sideloading Kali NetHunter on TicWatch Pro 3

cover pic

1. Project Overview

This project focuses on sideloading Kali NetHunter, a mobile penetration testing platform, onto the TicWatch Pro 3 running Wear OS. This process was incredibly challenging and required precise steps, custom hardware modifications, and persistence due to the watch's unique constraints, such as the lack of a data cable in its default packaging.

2. Resources and References

The following resources were critical for completing this project:

Additional Notes: The official Kali guide and XDA thread were the most reliable, but the YouTube video helped visualize the process despite not being an exact match for the TicWatch Pro 3. The BeeHiveSafety guide filled in gaps for specific steps.

Files I ended up using.:files used

3. Reset Steps (If Something Goes Wrong)

If the installation fails or the device becomes unstable, follow these steps to reset the TicWatch Pro 3:

  1. Step 1: Reboot into recovery mode.
  2. Step 2: Use ADB to push the stock firmware: adb push RUBYFISH_STOCK_PMRB.220703.001.zip /sdcard/.
  3. Step 3: Install the stock firmware (stock_PMRB.zip) via recovery.
  4. Step 4: Reboot to system.
  5. Step 5: Reboot to recovery again.
  6. Step 6: If "no command" appears:
    - Hold the top button and swipe up.
    - Select "wipe data and factory reset," then confirm with "yes."
  7. Step 7: Select "reboot system now" to complete the reset.

4. Installation Steps

The installation process is highly specific and must be followed in this exact order. This was not a simple task and required significant trial and error:

  1. Step 1: Enable Developer Options
    Description: Plug the TicWatch Pro 3 into a computer using a modified GoPro data cable (the watch ships with a power-only cable, so I had to cut and repurpose a GoPro cable for data transfer). Enable ADB in Developer Options.
    Challenges: Sourcing a data-capable cable was a major hurdle since the TicWatch Pro 3 does not include one.
  2. cable cable connect dev1 dev2
  3. Step 2: Reboot into bootloader: adb reboot bootloader.
  4. recovery1 recovery2
  5. Step 3: Disable verity and verification, then flash vbmeta: fastboot --disable-verity --disable-verification flash vbmeta vbmeta.img.
  6. Step 4: Flash the custom recovery: fastboot flash recovery rubyfish_recovery.img.
  7. Step 5: Reboot into recovery: adb reboot recovery.
  8. recovery2
  9. Step 6: In recovery, go to wipe > next page > format data > confirm with "yes."
  10. format Step 7: Reboot into recovery again, then wipe Dalvik and cache via the ADB sideload option.
  11. cache wipe
  12. Step 8: Sideload Magisk: adb sideload Magisk-v24.3b.zip.
  13. sideload
  14. Step 9: Push the disabler zip: adb push disabler.zip /sdcard/, then install it via the "Install zip" option in recovery.
  15. install
  16. Step 10: Reboot and complete the initial setup again.
  17. Step 11: Re-enable ADB in Developer Options.
  18. dev tools
  19. Step 12: Install the Magisk APK: adb install Magisk-v24.3.apk.
  20. Step 13: Reboot into recovery: adb reboot recovery.
  21. recovery
  22. Step 14: In recovery, go to wipe > next page > file system options > select system > resize.
  23. file systmem
  24. Step 15: Reboot to system.
  25. Step 16: Open Magisk and configure:
    - Disable "check-update."
    - Set "prompt in auto response."
    - Disable "toast notification."
  26. Step 17: Reboot into recovery: adb reboot recovery.
  27. sideload Step 18: In recovery, go to next page > Mount > enable system, CACHE, and DATA.
  28. Step 19: Push the NetHunter zip: adb push kali-nethunter-2024.4-ticwatchpro3-wearos-rootfs-nano.zip /sdcard/.
  29. Step 20: Reboot into recovery again.
  30. Step 21: Install the NetHunter zip via the "Install zip" option, then reboot to system.
  31. install
  32. Step 22: In Magisk, grant superuser access to the NetHunter app.
  33. super
  34. Step 23: Open the NetHunter app:
    - Allow popups.
    - Start the Kali Chroot.
  35. chroot1 chroot 2

5. Tips and Lessons Learned

Key takeaways and advice from this challenging project:

6. Conclusion

Successfully sideloading Kali NetHunter on the TicWatch Pro 3 was a difficult but rewarding endeavor. The process turned the wearable into a powerful, portable pentesting tool. Despite the challenges—like modifying a GoPro cable for data transfer and navigating the precise installation steps—I gained a deeper understanding of Wear OS rooting and NetHunter deployment. Future plans include testing NetHunter’s capabilities in real-world pentesting scenarios.

7. Additional Notes