Monday, July 25, 2016

Feedly:Darknet – The Darkside. WOL-E – Wake On LAN Security Testing Suite

from Darknet – The Darkside

root@kali:~# wol-e -h


[*] WOL-E 1.0

[*] Wake on LAN Explorer - A collection a WOL tools.

[*] by Nathaniel Carew



        Waking up single computers.

        If a password is required use the -k 00:12:34:56:78:90 at the end of the above command.

        wol-e -m 00:12:34:56:78:90 -b -p <port> -k <pass>


        Port: 9


        Pass: empty



        Sniffing the network for WOL requests and passwords.

        All captured WOL requests will be displayed on screen and written to /usr/share/wol-e/WOLClients.txt.

        wol-e -s -i eth0



        Bruteforce powering on WOL clients.

        wol-e -a -p <port>

        Place the address ranges into the bfmac.lst that you wish to bruteforce.

        They should be in the following format:


        Default port: 9



        Detecting Apple devices on the network for WOL enabling.

        This will output to the screen and write to /usr/share/wol-e/AppleTargets.txt for detected Apple MAC's.

        wol-e -f



        Attempt to wake all detected Apple targets in /usr/share/wol-e/AppleTargets.txt.

        This will send a single WOL packet to each client in the list and tell you how many clients were attempted.

        wol-e -fa

Web Analytics