Yeah yeah, i always look at the VARMAC_WPSWPA folder, no files are created in VARMAC_WHITELST here, cause i've never got the WPA pass from reaver (i guess the bssid is only white listed when wpa is found)...
I determined the WPS system was disabled after the process because there's a file "PIN_FOUND-63576764-victim_essid-XX:XX:XX:XX:XX:XX" in VARMAC_WPSWPA folder
but "airodump-ng --wps" shows nothing in the WPS field, and the device does not appear in wash scan.
root@kali:~/VARMAC_WHITELST# ls -n
root@kali:~/VARMAC_WPSWPA# ls -n
-rw-r--r-- 1 0 0 50 Dec 4 03:26 PIN_FOUND-63576764-victim_essid-XX:XX:XX:XX:XX:XX
As this WPA not being cracked with reaver only occurs here, maybe it's an issue with my wlan adapters:
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH WPS ESSID
XX:XX:XX:XX:XX:XX -63 5 0 0 6 54e WPA2 CCMP PSK victim_essid
WLAN0: Broadcom Corporation BCM4311 802.11b/g WLAN (rev 01)
WLAN1: Ralink Technology, Corp. MT7601U Wireless Adapter
Anyway, i'm happy with bully, it does the job.