root@kali:~# wol-e -h
[*] WOL–E 1.0
[*] Wake on LAN Explorer – A collection a WOL tools.
[*] by Nathaniel Carew
Waking up single computers.
If a password is required use the –k 00:12:34:56:78:90 at the end of the above command.
wol–e –m 00:12:34:56:78:90 –b 192.168.1.255 –p <port> –k <pass>
Sniffing the network for WOL requests and passwords.
All captured WOL requests will be displayed on screen and written to /usr/share/wol–e/WOLClients.txt.
wol–e –s –i eth0
Bruteforce powering on WOL clients.
wol–e –a –p <port>
Place the address ranges into the bfmac.lst that you wish to bruteforce.
They should be in the following format:
Default port: 9
Detecting Apple devices on the network for WOL enabling.
This will output to the screen and write to /usr/share/wol–e/AppleTargets.txt for detected Apple MAC‘s.
Attempt to wake all detected Apple targets in /usr/share/wol–e/AppleTargets.txt.
This will send a single WOL packet to each client in the list and tell you how many clients were attempted.