Hello all,

I'm running a WPS attack with Bully through FrankenScript (also tried with Reaver) using Kali 1.0.9 in VMWare 10.0.3 with an AWUS036NHA and after an hour or two it simply stops working. It still exists in ifconfig and airmon-ng and mon0 is still active however no more PIN attempts are made. If I unplug the wireless device and plug it back in and re-run the attack it starts working again.

This is not ideal with Bully which seems to only save the session every 64 pin attempts, I can lose a lot of pin attempts and end up doing redundant work retrying pins. At a rate of about 1 pin every 27 seconds due to WPS lockout this ends up slowing down the process quite some, and I can't simply leave it running and go about my business.

If anyone has any clues as to what is going on here and how I can sort it I'd be very happy!