mirror of
https://github.com/mubix/kaliwiki.git
synced 2025-10-29 16:59:26 +00:00
51 lines
1.2 KiB
Markdown
51 lines
1.2 KiB
Markdown
# wol-3
|
|
|
|
Notes
|
|
-------
|
|
|
|
Help Text
|
|
-------
|
|
```
|
|
[*] WOL-E 1.0
|
|
[*] Wake on LAN Explorer - A collection a WOL tools.
|
|
[*] by Nathaniel Carew
|
|
|
|
-m
|
|
Waking up single computers.
|
|
If a password is required use the -k 00:12:34:56:78:90 at the end of the above command.
|
|
wol-e.py -m 00:12:34:56:78:90 -b 192.168.1.255 -p <port> -k <pass>
|
|
Defaults:
|
|
Port: 9
|
|
Broadcast: 255.255.255.255
|
|
Pass: empty
|
|
|
|
-s
|
|
Sniffing the network for WOL requests and passwords.
|
|
All captured WOL requests will be displayed on screen and written to /usr/share/wol-e/WOLClients.txt.
|
|
wol-e.py -s -i eth0
|
|
|
|
-a
|
|
Bruteforce powering on WOL clients.
|
|
wol-e.py -a -p <port>
|
|
Place the address ranges into the bfmac.lst that you wish to bruteforce.
|
|
They should be in the following format:
|
|
00:12:34:56
|
|
Default port: 9
|
|
|
|
-f
|
|
Detecting Apple devices on the network for WOL enabling.
|
|
This will output to the screen and write to /usr/share/wol-e/AppleTargets.txt for detected Apple MAC's.
|
|
wol-e.py -f
|
|
|
|
-fa
|
|
Attempt to wake all detected Apple targets in /usr/share/wol-e/AppleTargets.txt.
|
|
This will send a single WOL packet to each client in the list and tell you how many clients were attempted.
|
|
wol-e.py -fa
|
|
```
|
|
|
|
Example Usage
|
|
-------
|
|
|
|
Links
|
|
-------
|