diff --git a/tools/wol-e.md b/tools/wol-e.md new file mode 100644 index 0000000..2cc72f8 --- /dev/null +++ b/tools/wol-e.md @@ -0,0 +1,50 @@ +# wol-3 + +Notes +------- + +Help Text +------- +``` +[*] WOL-E 1.0 +[*] Wake on LAN Explorer - A collection a WOL tools. +[*] by Nathaniel Carew + + -m + Waking up single computers. + If a password is required use the -k 00:12:34:56:78:90 at the end of the above command. + wol-e.py -m 00:12:34:56:78:90 -b 192.168.1.255 -p -k + Defaults: + Port: 9 + Broadcast: 255.255.255.255 + Pass: empty + + -s + Sniffing the network for WOL requests and passwords. + All captured WOL requests will be displayed on screen and written to /usr/share/wol-e/WOLClients.txt. + wol-e.py -s -i eth0 + + -a + Bruteforce powering on WOL clients. + wol-e.py -a -p + Place the address ranges into the bfmac.lst that you wish to bruteforce. + They should be in the following format: + 00:12:34:56 + Default port: 9 + + -f + Detecting Apple devices on the network for WOL enabling. + This will output to the screen and write to /usr/share/wol-e/AppleTargets.txt for detected Apple MAC's. + wol-e.py -f + + -fa + Attempt to wake all detected Apple targets in /usr/share/wol-e/AppleTargets.txt. + This will send a single WOL packet to each client in the list and tell you how many clients were attempted. + wol-e.py -fa +``` + +Example Usage +------- + +Links +-------