root@bt:/pentest/enumeration/wol-e# ./wol-e.py -h
[*] WOL-E 1.0
[*] Wake on LAN Explorer – A collection a WOL tools.
[*] by Nathaniel Carew
Waking up single computers.
If a password is required use the -k 00:12:34:56:78:90 at the end of the above command.
wol-e.py -m 00:12:34:56:78:90 -b 192.168.1.255 -p -k
Sniffing the network for WOL requests and passwords.
All captured WOL requests will be displayed on screen and written to WOLClients.txt.
wol-e.py -s -i eth0
Bruteforce powering on WOL clients.
wol-e.py -a -p
Place the address ranges into the bfmac.lst that you wish to bruteforce.
They should be in the following format:
Default port: 9
Detecting Apple devices on the network for WOL enabling.
This will output to the screen and write to AppleTargets.txt for detected Apple MAC’s.
Attempt to wake all detected Apple targets in AppleTargets.txt.
This will send a single WOL packet to each client in the list and tell you how many clients were attempted.