WOL-E is a suite of tools for the Wake on LAN feature of network attached computers, which is  now enabled by default on many Apple computers. it  include:

  • Bruteforcing the MAC address to wake up clients

  • Sniffing WOL attempts on the network and saving them to drive

  • Sniffing WOL passwords on the network and saving them to drive

  • Waking up single clients (post sniffing attack)

  • Scanning for Apple devices on the network for WOL enabling

  • Sending bulk WOL requests to all detected Apple clients



		Waking up single computers.
		If a password is required use the -k 00:12:34:56:78:90 at the end of the above command.
		wol - e.py -m 00:12:34:56:78:90 -b -p <port> -k <pass>
		Port: 9
		Pass: empty

		Sniffing the network for WOL requests and passwords.
		All captured WOL requests will be displayed on screen and written to WOLClients.txt.
		wol - e.py -s -i eth0

		Bruteforce powering on WOL clients.
		wol - e.py -a -p <port>
		Place the address ranges into the bfmac.lst that you wish to bruteforce.
		They should be in the following format:
		Default port: 9

		Detecting Apple devices on the network for WOL enabling.
		This will output to the screen and write to AppleTargets.txt for detected Apple MAC's.
		wol - e.py -f

		Attempt to wake all detected Apple targets in AppleTargets.txt.
		This will send a single WOL packet to each client in the list and tell you how many clients were attempted.
		wol - e.py -fa


cyborg@cyborg:~$ wol-e -f

    [*] WOL-E 1.0 [*]
    [*] Wake on LAN Explorer - Scan for Apple devices.

    [*] arping on eth0
    [*] Apple device detected: ac:ef:ca:ef:87:37 saving to OemTargets.txt

Leave a reply


We're are building as a community and a team. Be a part of it.


©2018 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?