On 17 October 2013 15:57, Josh More <[email protected]> wrote:
> I've done this in some environments.
>
> Nessus has a plugin to make this easier:
> http://www.tenable.com/blog/leveraging-wake-on-lan-support-to-audit-powered-off-hosts-with-nessus
>

I'm thinking more when acting as an attacker rather than an admin
doing scheduled scans, in that situation you wouldn't have a list of
MACs so would need to either blast all possible values or trim it a
bit by looking at existing machines and guessing probably OUIs.

Robin

> -Josh More
>
>
> On Thu, Oct 17, 2013 at 8:18 AM, Robin Wood <[email protected]> wrote:
>>
>> I'd never thought of WOL being used in corporate environments but someone
>> mentioned the other day that theirs did so I was wondering if anyone tries
>> flooding a network with WOL packets as part of a test to see if anything new
>> wakes up.
>>
>> It wouldn't take long to fire off a packet to every MAC address as it's a
>> single packet and you don't care about the reply. If it is a standardised
>> environment then you could limit the number you would have to send based on
>> OUI.
>>
>> Robin
>>
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to