information gathering – wol-e


backtrack 5r3

root@bt:/pentest/enumeration/wol-e# ./ -h

[*] WOL-E 1.0
[*] Wake on LAN Explorer – A collection a WOL tools.
[*] by Nathaniel Carew

Waking up single computers.
If a password is required use the -k 00:12:34:56:78:90 at the end of the above command. -m 00:12:34:56:78:90 -b -p -k
Port: 9
Pass: empty

Sniffing the network for WOL requests and passwords.
All captured WOL requests will be displayed on screen and written to WOLClients.txt. -s -i eth0

Bruteforce powering on WOL clients. -a -p
Place the address ranges into the bfmac.lst that you wish to bruteforce.
They should be in the following format:
Default port: 9

Detecting Apple devices on the network for WOL enabling.
This will output to the screen and write to AppleTargets.txt for detected Apple MAC’s. -f

Attempt to wake all detected Apple targets in AppleTargets.txt.
This will send a single WOL packet to each client in the list and tell you how many clients were attempted. -fa


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s