It can get you into trouble and is easily detectable by some of our previous guides.
This kind of unauthorized interference is technically a denial-of-service attack and, if sustained, is equivalent to jamming a network. The second downside of this tactic is that it's noisy and legally troubling in that it forces you to send packets that deliberately disconnect an authorized user for a service they are paying to use.
Don't Miss: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack. The network password might be weak and very easy to break, but without a device connected to kick off briefly, there is no opportunity to capture a handshake, thus no chance to try cracking it. The first downside is the requirement that someone is connected to the network to attack it. That has two downsides, which are essential for Wi-Fi hackers to understand. The old way of cracking WPA2 has been around quite some time and involves momentarily disconnecting a connected device from the access point we want to try to crack. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily. Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected.