Wol-e

Description

WOL-E is a suite of tools for the Wake on LAN feature of network attached computers, which is  now enabled by default on many Apple computers. it  include:

  • Bruteforcing the MAC address to wake up clients

  • Sniffing WOL attempts on the network and saving them to drive

  • Sniffing WOL passwords on the network and saving them to drive

  • Waking up single clients (post sniffing attack)

  • Scanning for Apple devices on the network for WOL enabling

  • Sending bulk WOL requests to all detected Apple clients

Usage

Options

-m
		Waking up single computers.
		If a password is required use the -k 00:12:34:56:78:90 at the end of the above command.
		wol - e.py -m 00:12:34:56:78:90 -b 192.168.1.255 -p <port> -k <pass>
		Defaults: 
		Port: 9
		Broadcast: 255.255.255.255
		Pass: empty

	-s
		Sniffing the network for WOL requests and passwords.
		All captured WOL requests will be displayed on screen and written to WOLClients.txt.
		wol - e.py -s -i eth0

	-a
		Bruteforce powering on WOL clients.
		wol - e.py -a -p <port>
		Place the address ranges into the bfmac.lst that you wish to bruteforce.
		They should be in the following format:
		00:12:34:56
		Default port: 9

	-f
		Detecting Apple devices on the network for WOL enabling.
		This will output to the screen and write to AppleTargets.txt for detected Apple MAC's.
		wol - e.py -f

	-fa
		Attempt to wake all detected Apple targets in AppleTargets.txt.
		This will send a single WOL packet to each client in the list and tell you how many clients were attempted.
		wol - e.py -fa

Example

cyborg@cyborg:~$ wol-e -f

    [*] WOL-E 1.0 [*]
    [*] Wake on LAN Explorer - Scan for Apple devices.

    [*] arping 192.168.1.0/24 on eth0
    [*] Apple device detected: ac:ef:ca:ef:87:37 192.168.1.5. saving to OemTargets.txt
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?