@slim Yes I have been testing different aireplay options to pace the usb wifi card.
Code:
aireplay-ng -0 20 -a "mac address of ap" -h "mac address of usb wifi card" mon0 --ignore-negative-one
I have tried the above code which doesn't lock up my usb wifi card at all, but then again it doesn't lock down the device in question it just does a global DoS attack on the AP. This allows devices to pop back up again on the network sporadically. My end goal is to knock down a specific device. This solution may work for another project I'm looking at down the road as long as the usb wifi card has the snot to ensure that no clients are able to reconnect at any point to the AP.
Code:
aireplay-ng -0 20 -a "mac address of ap" -c "mac address of client" mon0 --ignore-negative-one
This will succeed in locking down the client device, but the issue is that when sending more than 80 packets consecutively the usb wifi card locks up and a full reboot on the RPI is required. (TP-Link WN722N wireless card using Atheros chipset)
As I'm fairly new to linux, I'm sure there's probably some syntax that I'm unaware of that may be able to pace the broadcasting of the packets/ set a duration to keep the device locked down. If this is possible I would love to know that syntax.
Otherwise I'm digging some more to see if there is another solution to gain access to the network to lock down the device. Currently aircrack-ng takes far too long for a brute force attack on a password. A simple 8 digit number PSK on WPA2 test network was taking over 24 hours to decipher. I know I could use a laptop (and I'm exploring that option), but currently the price point on the RPI is much easier for me to swallow and I'm certain it has the same capabilities, it's just my noobish linux background which is halting my progress on this project.
Hopefully there is a solution in the two posts previous.
Thanks for any and all help.