Jump to content

Recommended Posts

Posted

Hi there, 

I'm responsible for running entry systems for festivals - many gates using 50 scanners each working over wifi. I am concerned that somebody is going to think it's a jolly jape to set up a deauth attack on a gate which would stop our scanners working. When we have 50,000 people waiting to come in, it's very bad news.

Can I deploy the tetra to watch for suspicious deauth packets if I suspect that's what happening? At least then I can inform the authorities that's what happening, not just our kit not working.

I need the tetra because depending on the environment we are on 2.4 and 5Ghz

 

Cheers

Posted (edited)
12 hours ago, bobbins said:

Can I deploy the tetra to watch for suspicious deauth packets

I have kinda used my tetra to look for deauth packets. I installed horst from the tetra using opkg. https://github.com/br101/horst/blob/master/README.md

In horst theres a stats page that allows you to view packets by type in %. of total traffic I could spot some basic DOS methods. Wont help so much tho with single targeted de-auths tho.

Edited by Just_a_User

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...