balzaar Posted May 28, 2019 Share Posted May 28, 2019 Hi forum, Just received the Tetra device this week but I have already run into issues with it. Clients do now show up after a basic recon and deauth attack on the set targets. I have followed the instructions from the Hak5 video referred to below, but still no clients available to me. I start with the recon stage and add the SSID to the PineAP Pool, then add the targeted devices MAC addresses to the PineAP from the options in the recon view. The MAC addresses can be visually seen in section Filters and these are set to Allow Listed. The SSID can also be identified under section PineAP and SSID Pool. The following PineAP options are enabled: PineAP Daemon: Enabled Autostart PineAP: Enabled Allow Associations Log PineAP Events Client Connect Notifications Client Disconnect Notifications Beacon Response Broadcast SSID Pool Other issues that I have identified with the Tetra device. No valid OUI information is presented about the available devices during the recon. Only shows "Unknown MAC prefix. This MAC was likely globally assigned by the hardware vendor. It has probably not been randomized for privacy." on all MAC addresses. Capture handshakes cannot be performed. I get a confirmation that the action is performed but no output. I have performed a factory reset twice and set up the device according to the video from Hak5, see URL below. WiFi Hacking Workflow - The NEW WiFi Pineapple 2.5 Firmware - Hak5 2514https://www.youtube.com/watch?v=CcnCbxoUWps The Tetra device is running the latest available firmware (v2.5.4), and the overall setup is vanilla and no fancy modules etcetera installed yet. Anyone got a clue what´s causing this issue? Debug info required to proceed in locating the issue? Link to comment Share on other sites More sharing options...
i8igmac Posted May 28, 2019 Share Posted May 28, 2019 the devices you are deauthing are updated and wont connect to the spoofed hotspot. Link to comment Share on other sites More sharing options...
balzaar Posted May 29, 2019 Author Share Posted May 29, 2019 Thanks for the reply! Updated how? Isn't the deauthentication frame part of the regular interaction between the AP and its hosts? When I Airreplay-ng on a laptop with a WiFi card, the same AP and clients are deauthenticated. I just cannot get the same to work on the Tetra. Link to comment Share on other sites More sharing options...
nikmel420 Posted June 2, 2019 Share Posted June 2, 2019 i wasnt think about a deauth attack. but yea i used pmkid attack ive not found a client in recon or anywere. thinking now as typingwhy i haven restart it yet. worse case reflash. so not just you Link to comment Share on other sites More sharing options...
balzaar Posted June 4, 2019 Author Share Posted June 4, 2019 On 6/2/2019 at 1:32 PM, nikmel420 said: i wasnt think about a deauth attack. but yea i used pmkid attack ive not found a client in recon or anywere. thinking now as typingwhy i haven restart it yet. worse case reflash. so not just you I will look into PMKID as you mentioned. Thanks for your input! Link to comment Share on other sites More sharing options...
kevtheskin Posted July 31, 2019 Share Posted July 31, 2019 Hi there, My nano does not deauth and capture either. My old kali box abd alfa card works no problem. I think I may have a faulty unit also attached a highgain antenna and still nothing. Kev Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.