Jump to content

Recommended Posts

Posted

Once I recon a network and set the SSID  and macs I would like to filter. The clients cannot join network after de-auth is sent. I have followed the steps verbatim according to nano primer video.What am I missing? I am using this on a windows ten, a kali VM and Kali bare metal install.  Anyone, please help or did I just get took for $100.00?

Posted

Irish the first question is what firmware version are you using?  Then are you de-authing a client from the nano and they can't connect back tot he nano or are you de-authing them from another network and they can't connect back to their network?  Are you attempting to gather a 4 way handshake?  My next question would be are you stopping the de-auth attack before the client tries to re-connect?

Posted
2 hours ago, irishvud00 said:

Once I recon a network and set the SSID  and macs I would like to filter. The clients cannot join network after de-auth is sent. I have followed the steps verbatim according to nano primer video.What am I missing? I am using this on a windows ten, a kali VM and Kali bare metal install.  Anyone, please help or did I just get took for $100.00?

I think it's pretty insulting when people have an issue and ask for help, but include these little negative comments such as "Did I just buy a $100 box" or "did I just get took for $100?". Please have some respect for the team when they put countless hours into bringing you a product.

You included next to no information on your issue other than what OS you are using, not any other valuable information such as the configuration of the target access point.

  • Upvote 3
Posted
14 minutes ago, Foxtrot said:

I think it's pretty insulting when people have an issue and ask for help, but include these little negative comments such as "Did I just buy a $100 box" or "did I just get took for $100?". Please have some respect for the team when they put countless hours into bringing you a product.

You included next to no information on your issue other than what OS you are using, not any other valuable information such as the configuration of the target access point.

I couldn't of said it better foxtrot

  • Upvote 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...