information gathering – wol-e

wol-e

backtrack 5r3

root@bt:/pentest/enumeration/wol-e# ./wol-e.py -h

[*] WOL-E 1.0
[*] Wake on LAN Explorer – A collection a WOL tools.
[*] by Nathaniel Carew

-m
Waking up single computers.
If a password is required use the -k 00:12:34:56:78:90 at the end of the above command.
wol-e.py -m 00:12:34:56:78:90 -b 192.168.1.255 -p -k
Defaults:
Port: 9
Broadcast: 255.255.255.255
Pass: empty

-s
Sniffing the network for WOL requests and passwords.
All captured WOL requests will be displayed on screen and written to WOLClients.txt.
wol-e.py -s -i eth0

-a
Bruteforce powering on WOL clients.
wol-e.py -a -p
Place the address ranges into the bfmac.lst that you wish to bruteforce.
They should be in the following format:
00:12:34:56
Default port: 9

-f
Detecting Apple devices on the network for WOL enabling.
This will output to the screen and write to AppleTargets.txt for detected Apple MAC’s.
wol-e.py -f

-fa
Attempt to wake all detected Apple targets in AppleTargets.txt.
This will send a single WOL packet to each client in the list and tell you how many clients were attempted.
wol-e.py -fa

root@bt:/pentest/enumeration/wol-e#

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s