WOL-E – Wake On LAN Security Testing Suite

root@kali:~# wol-e -h

[*] WOLE 1.0

[*] Wake on LAN Explorer A collection a WOL tools.

[*] by Nathaniel Carew


        Waking up single computers.

        If a password is required use the k 00:12:34:56:78:90 at the end of the above command.

        wole m 00:12:34:56:78:90 b p <port> k <pass>


        Port: 9


        Pass: empty


        Sniffing the network for WOL requests and passwords.

        All captured WOL requests will be displayed on screen and written to /usr/share/wole/WOLClients.txt.

        wole s i eth0


        Bruteforce powering on WOL clients.

        wole a p <port>

        Place the address ranges into the bfmac.lst that you wish to bruteforce.

        They should be in the following format:


        Default port: 9


        Detecting Apple devices on the network for WOL enabling.

        This will output to the screen and write to /usr/share/wole/AppleTargets.txt for detected Apple MACs.

        wole f


        Attempt to wake all detected Apple targets in /usr/share/wole/AppleTargets.txt.

        This will send a single WOL packet to each client in the list and tell you how many clients were attempted.

        wole fa

Leave a Reply