On 17 October 2013 15:57, Josh More <[email protected]> wrote: > I've done this in some environments. > > Nessus has a plugin to make this easier: > http://www.tenable.com/blog/leveraging-wake-on-lan-support-to-audit-powered-off-hosts-with-nessus >
I'm thinking more when acting as an attacker rather than an admin doing scheduled scans, in that situation you wouldn't have a list of MACs so would need to either blast all possible values or trim it a bit by looking at existing machines and guessing probably OUIs. Robin > -Josh More > > > On Thu, Oct 17, 2013 at 8:18 AM, Robin Wood <[email protected]> wrote: >> >> I'd never thought of WOL being used in corporate environments but someone >> mentioned the other day that theirs did so I was wondering if anyone tries >> flooding a network with WOL packets as part of a test to see if anything new >> wakes up. >> >> It wouldn't take long to fire off a packet to every MAC address as it's a >> single packet and you don't care about the reply. If it is a standardised >> environment then you could limit the number you would have to send based on >> OUI. >> >> Robin >> >> >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
