Hacking 10$ Nexus Phone Into a Hacking Machine

Note

Apr 17, 2026

· ~3 min read
Nexus 6P running Kali NetHunter chroot manager on a laptop

I saw Nexus 6P on Facebook Marketplace for $10. Owner forgot the PIN, just wanted it gone.

I already know Kali NetHunter support this phone officially. So I bought immediately without a second thought.

Literaly drove 25 miles after college to pick it up. First I spent a couple hours researching how to get in without the PIN. Wanted to do it properly and then i found CVE-2016-8467. Tried it. It worked. Here’s the full story on how come.

The Phone

Nexus 6P : Inside name angler. Made by Huawei, Google flagship from 2015.

Nexus 6P booting up

$ fastboot getvar version-bootloader
version-bootloader: 03.61

Bootloader 03.61. This one is weak. Safe version is 03.64 and above. When I see this number I actually pump my fist lol.

CVE-2016-8467

It’s a High risk cve and was already fixed in January 2017, but the phone wasn’t even updated since then. A big plus point for me ;P So, to summarize this,

CVECVE-2016-8467
TypeBoot mode bypass
RiskHigh
AffectedNexus 6P bootloader < 03.64
NeedPhysical access only, no PIN

So basically: this phone has hidden boot modes that Huawei put inside for factory testing. One of them called bp-tools. When you turn it on, phone open ADB connection even if you already disable developer mode, because the system enable it from boot level, not from the settings toggle.

The bug is Huawei forget to block this option when phone is locked. Anyone can just select it. No password, nothing.

Why PIN not important here

  PIN / Lock Screen  →  protect Android only
  CVE-2016-8467      →  go in before Android even start

  We didn't pick the lock. We went through the basement.

The Exploit

Need: phone, USB cable, laptop with fastboot. That’s all.

Hold Volume Down + Power to enter fastboot mode. On weak phone you see this menu:

  START
  RESTART BOOTLOADER
  RECOVERY MODE
  POWER OFF
  BP-TOOLS          ← this one
  FACTORY

Press volume to go down to BP-Tools. Press Power.

That’s it. One button. No command, no tool, no password. I’m serious.

Phone save this setting inside, so every reboot also still have it. Lock screen look totally normal. Owner don’t know anything.

$ fastboot devices
84B5T15B08000140    fastboot

Full access on a locked phone. Can flash anything.

Unlock and Flash

$ fastboot oem unlock
(bootloader) Bootloader unlocked.
OKAY

Then flash TWRP recovery:

$ fastboot boot twrp-3.7.0-angler.img   # test before flash
$ fastboot flash recovery twrp-3.7.0-angler.img

TWRP 3.7.0 running on the Nexus 6P

Here I made mistake ,i flashed custom ROM but forget to wipe cache. Phone go bootloop straight away. Had to reflash stock and start again. So painful.

Always wipe Dalvik and cache before flash new ROM.

Wipe → Advanced Wipe: ☑ Dalvik  ☑ System  ☑ Cache  ☑ Data

Kali NetHunter boot logo

$ adb shell
angler:/ $ chroot /data/local/nhsystem/kali-arm64 /bin/bash
┌──(root㉿kali)-[/]
└─# whoami
root

Full Kali Linux. On a phone. For $10. Cannot believe.


What It Can Do

WiFi monitor mode work on built-in WiFi, can run full aircrack-ng, no need extra hardware. Can also do USB attack where target computer think phone is a keyboard, i always wanted to try this and it did work, i might write an another blog for the same if i get a chance from these college assignments..

I guess that’s it for this. See ya :/


Aditional resources

↞  Back to notes