Jump to content

Can the tetra report on suspicious Deauth commands


bobbins

Recommended Posts

Hi there, 

I'm responsible for running entry systems for festivals - many gates using 50 scanners each working over wifi. I am concerned that somebody is going to think it's a jolly jape to set up a deauth attack on a gate which would stop our scanners working. When we have 50,000 people waiting to come in, it's very bad news.

Can I deploy the tetra to watch for suspicious deauth packets if I suspect that's what happening? At least then I can inform the authorities that's what happening, not just our kit not working.

I need the tetra because depending on the environment we are on 2.4 and 5Ghz

 

Cheers

Link to comment
Share on other sites

12 hours ago, bobbins said:

Can I deploy the tetra to watch for suspicious deauth packets

I have kinda used my tetra to look for deauth packets. I installed horst from the tetra using opkg. https://github.com/br101/horst/blob/master/README.md

In horst theres a stats page that allows you to view packets by type in %. of total traffic I could spot some basic DOS methods. Wont help so much tho with single targeted de-auths tho.

Edited by Just_a_User
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...