To keep things short I've been experimenting with cracking wpa in aircrack following the tutorial here by OTW. Everything works fine except a handshake is never captured as I am told when I go to run aircrack against the .cap file. I am using the panda PAU09 which plenty of people say works great, and yes the deauth command does work.
I'm testing this in a home lab type set up so I know for sure the device reconnects to the AP, but for some reason I cannot capture the handshake.
I am using the latest version of kali linux on the rpi