WOL-E – Wake On LAN Security Testing Suite

root@kali:~# wol-e -h

[*] WOLE 1.0

[*] Wake on LAN Explorer A collection a WOL tools.

[*] by Nathaniel Carew

    m

        Waking up single computers.

        If a password is required use the k 00:12:34:56:78:90 at the end of the above command.

        wole m 00:12:34:56:78:90 b 192.168.1.255 p <port> k <pass>

        Defaults:

        Port: 9

        Broadcast: 255.255.255.255

        Pass: empty

    s

        Sniffing the network for WOL requests and passwords.

        All captured WOL requests will be displayed on screen and written to /usr/share/wole/WOLClients.txt.

        wole s i eth0

    a

        Bruteforce powering on WOL clients.

        wole a p <port>

        Place the address ranges into the bfmac.lst that you wish to bruteforce.

        They should be in the following format:

        00:12:34:56

        Default port: 9

    f

        Detecting Apple devices on the network for WOL enabling.

        This will output to the screen and write to /usr/share/wole/AppleTargets.txt for detected Apple MACs.

        wole f

    fa

        Attempt to wake all detected Apple targets in /usr/share/wole/AppleTargets.txt.

        This will send a single WOL packet to each client in the list and tell you how many clients were attempted.

        wole fa

Leave a Reply