1RPCCLIENT(1) User Commands RPCCLIENT(1)
2
3
4
6 rpcclient - tool for executing client side MS-RPC functions
7
9 rpcclient [-A authfile] [-c <command string>] [-d debuglevel]
10 [-l logdir] [-N] [-s <smb config file>] [-U username[%password]]
11 [-W workgroup] [-I destinationIP] {BINDING-STRING|HOST}
12
14 This tool is part of the samba(7) suite.
15
16 rpcclient is a utility initially developed to test MS-RPC functionality
17 in Samba itself. It has undergone several stages of development and
18 stability. Many system administrators have now written scripts around
19 it to manage Windows NT clients from their UNIX workstation.
20
22 BINDING-STRING|HOST
23 When connecting to a dcerpc service you need to specify a binding
24 string.
25
26 The format is:
27
28 TRANSPORT:host[options]
29
30 where TRANSPORT is either ncacn_np (named pipes) for SMB or
31 ncacn_ip_tcp for DCERPC over TCP/IP.
32
33 "host" is an IP or hostname or netbios name. If the binding string
34 identifies the server side of an endpoint, "host" may be an empty
35 string. See below for more details.
36
37 "options" can include a SMB pipe name if using the ncacn_np
38 transport or a TCP port number if using the ncacn_ip_tcp transport,
39 otherwise they will be auto-determined.
40
41 Examples:
42
43 • ncacn_ip_tcp:samba.example.com[1024]
44
45 • ncacn_ip_tcp:samba.example.com[sign,seal,krb5]
46
47 • ncacn_ip_tcp:samba.example.com[sign,spnego]
48
49 • ncacn_np:samba.example.com
50
51 • ncacn_np:samba.example.com[samr]
52
53 • ncacn_np:samba.example.com[samr,sign,print]
54
55 • ncalrpc:/path/to/unix/socket
56
57 • //SAMBA
58
59 The supported transports are:
60
61 • ncacn_np - Connect using named pipes
62
63 • ncacn_ip_tcp - Connect over TCP/IP
64
65 • ncalrpc - Connect over local RPC (unix sockets)
66
67 The supported options are:
68
69 • sign - Use RPC integrity authentication level
70
71 • seal - Enable RPC privacy (encryption) authentication
72 level
73
74 • connect - Use RPC connect level authentication (auth,
75 but no sign or seal)
76
77 • packet - Use RPC packet authentication level
78
79 • spnego - Use SPNEGO instead of NTLMSSP authentication
80
81 • ntlm - Use plain NTLM instead of SPNEGO or NTLMSSP
82
83 • krb5 - Use Kerberos instead of NTLMSSP authentication
84
85 • schannel - Create a schannel connection
86
87 • smb1 - Use SMB1 for named pipes
88
89 • smb2 - Use SMB2/3 for named pipes
90
91 • validate - Enable the NDR validator
92
93 • print - Enable debug output of packets
94
95 • padcheck - Check reply data for non-zero pad bytes
96
97 • bigendian - Use big endian for RPC
98
99 • ndr64 - Use NDR64 for RPC
100
101
102 -c|--command=<command string>
103 Execute semicolon separated commands (listed below)
104
105 -I|--dest-ip IP-address
106 IP address is the address of the server to connect to. It should be
107 specified in standard "a.b.c.d" notation.
108
109 Normally the client would attempt to locate a named SMB/CIFS server
110 by looking it up via the NetBIOS name resolution mechanism
111 described above in the name resolve order parameter above. Using
112 this parameter will force the client to assume that the server is
113 on the machine with the specified IP address and the NetBIOS name
114 component of the resource being connected to will be ignored.
115
116 There is no default for this parameter. If not supplied, it will be
117 determined automatically by the client as described above.
118
119 -p|--port port
120 This number is the TCP port number that will be used when making
121 connections to the server. The standard (well-known) TCP port
122 number for an SMB/CIFS server is 139, which is the default.
123
124 -d|--debuglevel=level
125 level is an integer from 0 to 10. The default value if this
126 parameter is not specified is 0.
127
128 The higher this value, the more detail will be logged to the log
129 files about the activities of the server. At level 0, only critical
130 errors and serious warnings will be logged. Level 1 is a reasonable
131 level for day-to-day running - it generates a small amount of
132 information about operations carried out.
133
134 Levels above 1 will generate considerable amounts of log data, and
135 should only be used when investigating a problem. Levels above 3
136 are designed for use only by developers and generate HUGE amounts
137 of log data, most of which is extremely cryptic.
138
139 Note that specifying this parameter here will override the log
140 level parameter in the smb.conf file.
141
142 -V|--version
143 Prints the program version number.
144
145 -s|--configfile=<configuration file>
146 The file specified contains the configuration details required by
147 the server. The information in this file includes server-specific
148 information such as what printcap file to use, as well as
149 descriptions of all the services that the server is to provide. See
150 smb.conf for more information. The default configuration file name
151 is determined at compile time.
152
153 -l|--log-basename=logdirectory
154 Base directory name for log/debug files. The extension ".progname"
155 will be appended (e.g. log.smbclient, log.smbd, etc...). The log
156 file is never removed by the client.
157
158 --option=<name>=<value>
159 Set the smb.conf(5) option "<name>" to value "<value>" from the
160 command line. This overrides compiled-in defaults and options read
161 from the configuration file.
162
163 -N|--no-pass
164 If specified, this parameter suppresses the normal password prompt
165 from the client to the user. This is useful when accessing a
166 service that does not require a password.
167
168 Unless a password is specified on the command line or this
169 parameter is specified, the client will request a password.
170
171 If a password is specified on the command line and this option is
172 also defined the password on the command line will be silently
173 ignored and no password will be used.
174
175 -k|--kerberos
176 Try to authenticate with kerberos. Only useful in an Active
177 Directory environment.
178
179 -C|--use-ccache
180 Try to use the credentials cached by winbind.
181
182 -A|--authentication-file=filename
183 This option allows you to specify a file from which to read the
184 username and password used in the connection. The format of the
185 file is
186
187 username = <value>
188 password = <value>
189 domain = <value>
190
191 Make certain that the permissions on the file restrict access from
192 unwanted users.
193
194 -U|--user=username[%password]
195 Sets the SMB username or username and password.
196
197 If %password is not specified, the user will be prompted. The
198 client will first check the USER environment variable, then the
199 LOGNAME variable and if either exists, the string is uppercased. If
200 these environmental variables are not found, the username GUEST is
201 used.
202
203 A third option is to use a credentials file which contains the
204 plaintext of the username and password. This option is mainly
205 provided for scripts where the admin does not wish to pass the
206 credentials on the command line or via environment variables. If
207 this method is used, make certain that the permissions on the file
208 restrict access from unwanted users. See the -A for more details.
209
210 Be cautious about including passwords in scripts. Also, on many
211 systems the command line of a running process may be seen via the
212 ps command. To be safe always allow rpcclient to prompt for a
213 password and type it in directly.
214
215 -S|--signing on|off|required
216 Set the client signing state.
217
218 -P|--machine-pass
219 Use stored machine account password.
220
221 -e|--encrypt
222 This command line parameter requires the remote server support the
223 UNIX extensions or that the SMB3 protocol has been selected.
224 Requests that the connection be encrypted. Negotiates SMB
225 encryption using either SMB3 or POSIX extensions via GSSAPI. Uses
226 the given credentials for the encryption negotiation (either
227 kerberos or NTLMv1/v2 if given domain/username/password triple.
228 Fails the connection if encryption cannot be negotiated.
229
230 --pw-nt-hash
231 The supplied password is the NT hash.
232
233 -n|--netbiosname <primary NetBIOS name>
234 This option allows you to override the NetBIOS name that Samba uses
235 for itself. This is identical to setting the netbios name parameter
236 in the smb.conf file. However, a command line setting will take
237 precedence over settings in smb.conf.
238
239 -i|--scope <scope>
240 This specifies a NetBIOS scope that nmblookup will use to
241 communicate with when generating NetBIOS names. For details on the
242 use of NetBIOS scopes, see rfc1001.txt and rfc1002.txt. NetBIOS
243 scopes are very rarely used, only set this parameter if you are the
244 system administrator in charge of all the NetBIOS systems you
245 communicate with.
246
247 -W|--workgroup=domain
248 Set the SMB domain of the username. This overrides the default
249 domain which is the domain defined in smb.conf. If the domain
250 specified is the same as the servers NetBIOS name, it causes the
251 client to log on using the servers local SAM (as opposed to the
252 Domain SAM).
253
254 -O|--socket-options socket options
255 TCP socket options to set on the client socket. See the socket
256 options parameter in the smb.conf manual page for the list of valid
257 options.
258
259 -?|--help
260 Print a summary of command line options.
261
262 --usage
263 Display brief usage message.
264
266 LSARPC
267 lsaquery
268 Query info policy
269
270 lookupsids
271 Convert SIDs to names
272
273 lookupsids3
274 Convert SIDs to names
275
276 lookupsids_level
277 Convert SIDs to names
278
279 lookupnames
280 Convert names to SIDs
281
282 lookupnames4
283 Convert names to SIDs
284
285 lookupnames_level
286 Convert names to SIDs
287
288 enumtrust
289 Enumerate trusted domains
290
291 enumprivs
292 Enumerate privileges
293
294 getdispname
295 Get the privilege name
296
297 lsaenumsid
298 Enumerate the LSA SIDS
299
300 lsacreateaccount
301 Create a new lsa account
302
303 lsaenumprivsaccount
304 Enumerate the privileges of an SID
305
306 lsaenumacctrights
307 Enumerate the rights of an SID
308
309 lsaaddpriv
310 Assign a privilege to a SID
311
312 lsadelpriv
313 Revoke a privilege from a SID
314
315 lsaaddacctrights
316 Add rights to an account
317
318 lsaremoveacctrights
319 Remove rights from an account
320
321 lsalookupprivvalue
322 Get a privilege value given its name
323
324 lsaquerysecobj
325 Query LSA security object
326
327 lsaquerytrustdominfo
328 Query LSA trusted domains info (given a SID)
329
330 lsaquerytrustdominfobyname
331 Query LSA trusted domains info (given a name), only works for
332 Windows > 2k
333
334 lsaquerytrustdominfobysid
335 Query LSA trusted domains info (given a SID)
336
337 lsasettrustdominfo
338 Set LSA trusted domain info
339
340 getusername
341 Get username
342
343 createsecret
344 Create Secret
345
346 deletesecret
347 Delete Secret
348
349 querysecret
350 Query Secret
351
352 setsecret
353 Set Secret
354
355 retrieveprivatedata
356 Retrieve Private Data
357
358 storeprivatedata
359 Store Private Data
360
361 createtrustdom
362 Create Trusted Domain
363
364 deletetrustdom
365 Delete Trusted Domain
366
367 LSARPC-DS
368 dsroledominfo
369 Get Primary Domain Information
370
371 DFS
372 dfsversion
373 Query DFS support
374
375 dfsadd
376 Add a DFS share
377
378 dfsremove
379 Remove a DFS share
380
381 dfsgetinfo
382 Query DFS share info
383
384 dfsenum
385 Enumerate dfs shares
386
387 dfsenumex
388 Enumerate dfs shares
389
390 SHUTDOWN
391 shutdowninit
392 syntax: shutdown [-m message]
393
394 shutdownabort
395 syntax: shutdownabort
396
397 SRVSVC
398 srvinfo
399 Server query info
400
401 netshareenum
402 Enumerate shares
403
404 netshareenumall
405 Enumerate all shares
406
407 netsharegetinfo
408 Get Share Info
409
410 netsharesetinfo
411 Set Share Info
412
413 netsharesetdfsflags
414 Set DFS flags
415
416 netfileenum
417 Enumerate open files
418
419 netremotetod
420 Fetch remote time of day
421
422 netnamevalidate
423 Validate sharename
424
425 netfilegetsec
426 Get File security
427
428 netsessdel
429 Delete Session
430
431 netsessenum
432 Enumerate Sessions
433
434 netdiskenum
435 Enumerate Disks
436
437 netconnenum
438 Enumerate Connections
439
440 netshareadd
441 Add share
442
443 netsharedel
444 Delete share
445
446 SAMR
447 queryuser
448 Query user info
449
450 querygroup
451 Query group info
452
453 queryusergroups
454 Query user groups
455
456 queryuseraliases
457 Query user aliases
458
459 querygroupmem
460 Query group membership
461
462 queryaliasmem
463 Query alias membership
464
465 queryaliasinfo
466 Query alias info
467
468 deletealias
469 Delete an alias
470
471 querydispinfo
472 Query display info
473
474 querydispinfo2
475 Query display info
476
477 querydispinfo3
478 Query display info
479
480 querydominfo
481 Query domain info
482
483 enumdomusers
484 Enumerate domain users
485
486 enumdomgroups
487 Enumerate domain groups
488
489 enumalsgroups
490 Enumerate alias groups
491
492 enumdomains
493 Enumerate domains
494
495 createdomuser
496 Create domain user
497
498 createdomgroup
499 Create domain group
500
501 createdomalias
502 Create domain alias
503
504 samlookupnames
505 Look up names
506
507 samlookuprids
508 Look up names
509
510 deletedomgroup
511 Delete domain group
512
513 deletedomuser
514 Delete domain user
515
516 samquerysecobj
517 Query SAMR security object
518
519 getdompwinfo
520 Retrieve domain password info
521
522 getusrdompwinfo
523 Retrieve user domain password info
524
525 lookupdomain
526 Lookup Domain Name
527
528 chgpasswd
529 Change user password
530
531 chgpasswd2
532 Change user password
533
534 chgpasswd3
535 Change user password
536
537 getdispinfoidx
538 Get Display Information Index
539
540 setuserinfo
541 Set user info
542
543 setuserinfo2
544 Set user info2
545
546 SPOOLSS
547 adddriver <arch> <config> [<version>]
548 Execute an AddPrinterDriver() RPC to install the printer driver
549 information on the server. Note that the driver files should
550 already exist in the directory returned by getdriverdir. Possible
551 values for arch are the same as those for the getdriverdir command.
552 The config parameter is defined as follows:
553
554 Long Driver Name:\
555 Driver File Name:\
556 Data File Name:\
557 Config File Name:\
558 Help File Name:\
559 Language Monitor Name:\
560 Default Data Type:\
561 Comma Separated list of Files
562
563 Any empty fields should be enter as the string "NULL".
564
565 Samba does not need to support the concept of Print Monitors since
566 these only apply to local printers whose driver can make use of a
567 bi-directional link for communication. This field should be "NULL".
568 On a remote NT print server, the Print Monitor for a driver must
569 already be installed prior to adding the driver or else the RPC
570 will fail.
571
572 The version parameter lets you specify the printer driver version
573 number. If omitted, the default driver version for the specified
574 architecture will be used. This option can be used to upload
575 Windows 2000 (version 3) printer drivers.
576
577 addprinter <printername> <sharename> <drivername> <port>
578 Add a printer on the remote server. This printer will be
579 automatically shared. Be aware that the printer driver must already
580 be installed on the server (see adddriver) and the portmust be a
581 valid port name (see enumports.
582
583 deldriver <driver>
584 Delete the specified printer driver for all architectures. This
585 does not delete the actual driver files from the server, only the
586 entry from the server's list of drivers.
587
588 deldriverex <driver> [architecture] [version] [flags]
589 Delete the specified printer driver and optionally files associated
590 with the driver. You can limit this action to a specific
591 architecture and a specific version. If no architecture is given,
592 all driver files of that driver will be deleted. flags correspond
593 to numeric DPD_* values, i.e. a value of 3 requests
594 (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION).
595
596 enumdata
597 Enumerate all printer setting data stored on the server. On Windows
598 NT clients, these values are stored in the registry, while Samba
599 servers store them in the printers TDB. This command corresponds to
600 the MS Platform SDK GetPrinterData() function (* This command is
601 currently unimplemented).
602
603 enumdataex
604 Enumerate printer data for a key
605
606 enumkey
607 Enumerate printer keys
608
609 enumjobs <printer>
610 List the jobs and status of a given printer. This command
611 corresponds to the MS Platform SDK EnumJobs() function
612
613 getjob
614 Get print job
615
616 setjob
617 Set print job
618
619 enumports [level]
620 Executes an EnumPorts() call using the specified info level.
621 Currently only info levels 1 and 2 are supported.
622
623 enumdrivers [level]
624 Execute an EnumPrinterDrivers() call. This lists the various
625 installed printer drivers for all architectures. Refer to the MS
626 Platform SDK documentation for more details of the various flags
627 and calling options. Currently supported info levels are 1, 2, and
628 3.
629
630 enumprinters [level]
631 Execute an EnumPrinters() call. This lists the various installed
632 and share printers. Refer to the MS Platform SDK documentation for
633 more details of the various flags and calling options. Currently
634 supported info levels are 1, 2 and 5.
635
636 getdata <printername> <valuename;>
637 Retrieve the data for a given printer setting. See the enumdata
638 command for more information. This command corresponds to the
639 GetPrinterData() MS Platform SDK function.
640
641 getdataex
642 Get printer driver data with keyname
643
644 getdriver <printername>
645 Retrieve the printer driver information (such as driver file,
646 config file, dependent files, etc...) for the given printer. This
647 command corresponds to the GetPrinterDriver() MS Platform SDK
648 function. Currently info level 1, 2, and 3 are supported.
649
650 getdriverdir <arch>
651 Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share
652 name and subdirectory for storing printer driver files for a given
653 architecture. Possible values for arch are "Windows 4.0" (for
654 Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows
655 Alpha_AXP", and "Windows NT R4000".
656
657 getdriverpackagepath
658 Get print driver package download directory
659
660 getprinter <printername>
661 Retrieve the current printer information. This command corresponds
662 to the GetPrinter() MS Platform SDK function.
663
664 openprinter <printername>
665 Execute an OpenPrinterEx() and ClosePrinter() RPC against a given
666 printer.
667
668 openprinter_ex <printername>
669 Open printer handle
670
671 setdriver <printername> <drivername>
672 Execute a SetPrinter() command to update the printer driver
673 associated with an installed printer. The printer driver must
674 already be correctly installed on the print server.
675
676 See also the enumprinters and enumdrivers commands for obtaining a
677 list of of installed printers and drivers.
678
679 getprintprocdir
680 Get print processor directory
681
682 addform
683 Add form
684
685 setform
686 Set form
687
688 getform
689 Get form
690
691 deleteform
692 Delete form
693
694 enumforms
695 Enumerate form
696
697 setprinter
698 Set printer comment
699
700 setprinterdata
701 Set REG_SZ printer data
702
703 setprintername <printername> <newprintername>
704 Set printer name
705
706 rffpcnex
707 Rffpcnex test
708
709 printercmp
710 Printer comparison test
711
712 enumprocs
713 Enumerate Print Processors
714
715 enumprocdatatypes
716 Enumerate Print Processor Data Types
717
718 enummonitors
719 Enumerate Print Monitors
720
721 createprinteric
722 Create Printer IC
723
724 playgdiscriptonprinteric
725 Create Printer IC
726
727 getcoreprinterdrivers
728 Get CorePrinterDriver
729
730 enumpermachineconnections
731 Enumerate Per Machine Connections
732
733 addpermachineconnection
734 Add Per Machine Connection
735
736 delpermachineconnection
737 Delete Per Machine Connection
738
739 NETLOGON
740 logonctrl2
741 Logon Control 2
742
743 getanydcname
744 Get trusted DC name
745
746 getdcname
747 Get trusted PDC name
748
749 dsr_getdcname
750 Get trusted DC name
751
752 dsr_getdcnameex
753 Get trusted DC name
754
755 dsr_getdcnameex2
756 Get trusted DC name
757
758 dsr_getsitename
759 Get sitename
760
761 dsr_getforesttrustinfo
762 Get Forest Trust Info
763
764 logonctrl
765 Logon Control
766
767 samlogon
768 Sam Logon
769
770 change_trust_pw
771 Change Trust Account Password
772
773 gettrustrid
774 Get trust rid
775
776 dsr_enumtrustdom
777 Enumerate trusted domains
778
779 dsenumdomtrusts
780 Enumerate all trusted domains in an AD forest
781
782 deregisterdnsrecords
783 Deregister DNS records
784
785 netrenumtrusteddomains
786 Enumerate trusted domains
787
788 netrenumtrusteddomainsex
789 Enumerate trusted domains
790
791 getdcsitecoverage
792 Get the Site-Coverage from a DC
793
794 capabilities
795 Return Capabilities
796
797 logongetdomaininfo
798 Return LogonGetDomainInfo
799
800 FSRVP
801 fss_is_path_sup
802 Check whether a share supports shadow-copy
803
804 fss_get_sup_version
805 Get supported FSRVP version from server
806
807 fss_create_expose
808 Request shadow-copy creation and exposure
809
810 fss_delete
811 Request shadow-copy share deletion
812
813 fss_has_shadow_copy
814 Check for an associated share shadow-copy
815
816 fss_get_mapping
817 Get shadow-copy share mapping information
818
819 fss_recovery_complete
820 Flag read-write snapshot as recovery complete,
821
822 CLUSAPI
823 clusapi_open_cluster
824 Open cluster
825
826 clusapi_get_cluster_name
827 Get cluster name
828
829 clusapi_get_cluster_version
830 Get cluster version
831
832 clusapi_get_quorum_resource
833 Get quorum resource
834
835 clusapi_create_enum
836 Create enum query
837
838 clusapi_create_enumex
839 Create enumex query
840
841 clusapi_open_resource
842 Open cluster resource
843
844 clusapi_online_resource
845 Set cluster resource online
846
847 clusapi_offline_resource
848 Set cluster resource offline
849
850 clusapi_get_resource_state
851 Get cluster resource state
852
853 clusapi_get_cluster_version2
854 Get cluster version2
855
856 clusapi_pause_node
857 Pause cluster node
858
859 clusapi_resume_node
860 Resume cluster node
861
862 DRSUAPI
863 dscracknames
864 Crack Name
865
866 dsgetdcinfo
867 Get Domain Controller Info
868
869 dsgetncchanges
870 Get NC Changes
871
872 dswriteaccountspn
873 Write Account SPN
874
875 ECHO
876 echoaddone
877 Add one to a number
878
879 echodata
880 Echo data
881
882 sinkdata
883 Sink data
884
885 sourcedata
886 Source data
887
888 EPMAPPER
889 epmmap
890 Map a binding
891
892 epmlookup
893 Lookup bindings
894
895 EVENTLOG
896 eventlog_readlog
897 Read Eventlog
898
899 eventlog_numrecord
900 Get number of records
901
902 eventlog_oldestrecord
903 Get oldest record
904
905 eventlog_reportevent
906 Report event
907
908 eventlog_reporteventsource
909 Report event and source
910
911 eventlog_registerevsource
912 Register event source
913
914 eventlog_backuplog
915 Backup Eventlog File
916
917 eventlog_loginfo
918 Get Eventlog Information
919
920 IRemoteWinspool
921 winspool_AsyncOpenPrinter
922 Open printer handle
923
924 winspool_AsyncCorePrinterDriverInstalled
925 Query Core Printer Driver Installed
926
927 NTSVCS
928 ntsvcs_getversion
929 Query NTSVCS version
930
931 ntsvcs_validatedevinst
932 Query NTSVCS device instance
933
934 ntsvcs_hwprofflags
935 Query NTSVCS HW prof flags
936
937 ntsvcs_hwprofinfo
938 Query NTSVCS HW prof info
939
940 ntsvcs_getdevregprop
941 Query NTSVCS device registry property
942
943 ntsvcs_getdevlistsize
944 Query NTSVCS device list size
945
946 ntsvcs_getdevlist
947 Query NTSVCS device list
948
949 MDSSVC
950 fetch_properties
951 Fetch connection properties
952
953 fetch_attributes
954 Fetch attributes for a CNID
955
956 WINREG
957 winreg_enumkey
958 Enumerate Keys
959
960 querymultiplevalues
961 Query multiple values
962
963 querymultiplevalues2
964 Query multiple values
965
966 WITNESS
967 GetInterfaceList
968 List the interfaces to which witness client connections can be made
969
970 Register
971 Register for resource state change notifications of a NetName and
972 IPAddress
973
974 UnRegister
975 Unregister for notifications from the server
976
977 AsyncNotify
978 Request notification of registered resource changes from the server
979
980 RegisterEx
981 Register for resource state change notifications of a NetName,
982 ShareName and multiple IPAddresses
983
984 WKSSVC
985 wkssvc_wkstagetinfo
986 Query WKSSVC Workstation Information
987
988 wkssvc_getjoininformation
989 Query WKSSVC Join Information
990
991 wkssvc_messagebuffersend
992 Send WKSSVC message
993
994 wkssvc_enumeratecomputernames
995 Enumerate WKSSVC computer names
996
997 wkssvc_enumerateusers
998 Enumerate WKSSVC users
999
1000 GENERAL OPTIONS
1001 help
1002 Get help on commands
1003
1004 ?
1005 Get help on commands
1006
1007 debuglevel
1008 Set debug level
1009
1010 debug
1011 Set debug level
1012
1013 list
1014 List available commands on pipe
1015
1016 exit
1017 Exit program
1018
1019 quit
1020 Exit program
1021
1022 sign
1023 Force RPC pipe connections to be signed
1024
1025 seal
1026 Force RPC pipe connections to be sealed
1027
1028 packet
1029 Force RPC pipe connections with packet authentication level
1030
1031 schannel
1032 Force RPC pipe connections to be sealed with 'schannel'. Force RPC
1033 pipe connections to be sealed with 'schannel'. Assumes valid
1034 machine account to this domain controller.
1035
1036 schannelsign
1037 Force RPC pipe connections to be signed (not sealed) with
1038 'schannel'. Assumes valid machine account to this domain
1039 controller.
1040
1041 timeout
1042 Set timeout (in milliseconds) for RPC operations
1043
1044 transport
1045 Choose ncacn transport for RPC operations
1046
1047 none
1048 Force RPC pipe connections to have no special properties
1049
1051 rpcclient is designed as a developer testing tool and may not be robust
1052 in certain areas (such as command line parsing). It has been known to
1053 generate a core dump upon failures when invalid parameters where passed
1054 to the interpreter.
1055
1056 From Luke Leighton's original rpcclient man page:
1057
1058 WARNING! The MSRPC over SMB code has been developed from examining
1059 Network traces. No documentation is available from the original
1060 creators (Microsoft) on how MSRPC over SMB works, or how the individual
1061 MSRPC services work. Microsoft's implementation of these services has
1062 been demonstrated (and reported) to be... a bit flaky in places.
1063
1064 The development of Samba's implementation is also a bit rough, and as
1065 more of the services are understood, it can even result in versions of
1066 smbd(8) and rpcclient(1) that are incompatible for some commands or
1067 services. Additionally, the developers are sending reports to
1068 Microsoft, and problems found or reported to Microsoft are fixed in
1069 Service Packs, which may result in incompatibilities.
1070
1072 This man page is part of version 4.14.5 of the Samba suite.
1073
1075 The original Samba software and related utilities were created by
1076 Andrew Tridgell. Samba is now developed by the Samba Team as an Open
1077 Source project similar to the way the Linux kernel is developed.
1078
1079 The original rpcclient man page was written by Matthew Geddes, Luke
1080 Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion
1081 to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to
1082 DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.
1083
1084
1085
1086Samba 4.14.5 06/01/2021 RPCCLIENT(1)