1RPCCLIENT(1)                     User Commands                    RPCCLIENT(1)
2
3
4

NAME

6       rpcclient - tool for executing client side MS-RPC functions
7

SYNOPSIS

9       rpcclient [-A authfile] [-c <command string>] [-d debuglevel]
10        [-l logdir] [-N] [-s <smb config file>] [-U username[%password]]
11        [-W workgroup] [-I destinationIP] {BINDING-STRING|HOST}
12

DESCRIPTION

14       This tool is part of the samba(7) suite.
15
16       rpcclient is a utility initially developed to test MS-RPC functionality
17       in Samba itself. It has undergone several stages of development and
18       stability. Many system administrators have now written scripts around
19       it to manage Windows NT clients from their UNIX workstation.
20

OPTIONS

22       BINDING-STRING|HOST
23           When connecting to a dcerpc service you need to specify a binding
24           string.
25
26           The format is:
27
28           TRANSPORT:host[options]
29
30           where TRANSPORT is either ncacn_np (named pipes) for SMB or
31           ncacn_ip_tcp for DCERPC over TCP/IP.
32
33           "host" is an IP or hostname or netbios name. If the binding string
34           identifies the server side of an endpoint, "host" may be an empty
35           string. See below for more details.
36
37           "options" can include a SMB pipe name if using the ncacn_np
38           transport or a TCP port number if using the ncacn_ip_tcp transport,
39           otherwise they will be auto-determined.
40
41           Examples:
42
43ncacn_ip_tcp:samba.example.com[1024]
44
45ncacn_ip_tcp:samba.example.com[sign,seal,krb5]
46
47ncacn_ip_tcp:samba.example.com[sign,spnego]
48
49ncacn_np:samba.example.com
50
51ncacn_np:samba.example.com[samr]
52
53ncacn_np:samba.example.com[samr,sign,print]
54
55ncalrpc:/path/to/unix/socket
56
57//SAMBA
58
59           The supported transports are:
60
61ncacn_np - Connect using named pipes
62
63ncacn_ip_tcp - Connect over TCP/IP
64
65ncalrpc - Connect over local RPC (unix sockets)
66
67           The supported options are:
68
69sign - Use RPC integrity authentication level
70
71seal - Enable RPC privacy (encryption) authentication
72                      level
73
74connect - Use RPC connect level authentication (auth,
75                      but no sign or seal)
76
77packet - Use RPC packet authentication level
78
79spnego - Use SPNEGO instead of NTLMSSP authentication
80
81ntlm - Use plain NTLM instead of SPNEGO or NTLMSSP
82
83krb5 - Use Kerberos instead of NTLMSSP authentication
84
85schannel - Create a schannel connection
86
87smb1 - Use SMB1 for named pipes
88
89smb2 - Use SMB2/3 for named pipes
90
91validate - Enable the NDR validator
92
93print - Enable debug output of packets
94
95padcheck - Check reply data for non-zero pad bytes
96
97bigendian - Use big endian for RPC
98
99ndr64 - Use NDR64 for RPC
100
101
102       -c|--command=<command string>
103           Execute semicolon separated commands (listed below)
104
105       -I|--dest-ip IP-address
106           IP address is the address of the server to connect to. It should be
107           specified in standard "a.b.c.d" notation.
108
109           Normally the client would attempt to locate a named SMB/CIFS server
110           by looking it up via the NetBIOS name resolution mechanism
111           described above in the name resolve order parameter above. Using
112           this parameter will force the client to assume that the server is
113           on the machine with the specified IP address and the NetBIOS name
114           component of the resource being connected to will be ignored.
115
116           There is no default for this parameter. If not supplied, it will be
117           determined automatically by the client as described above.
118
119       -p|--port port
120           This number is the TCP port number that will be used when making
121           connections to the server. The standard (well-known) TCP port
122           number for an SMB/CIFS server is 139, which is the default.
123
124       -d|--debuglevel=level
125           level is an integer from 0 to 10. The default value if this
126           parameter is not specified is 0.
127
128           The higher this value, the more detail will be logged to the log
129           files about the activities of the server. At level 0, only critical
130           errors and serious warnings will be logged. Level 1 is a reasonable
131           level for day-to-day running - it generates a small amount of
132           information about operations carried out.
133
134           Levels above 1 will generate considerable amounts of log data, and
135           should only be used when investigating a problem. Levels above 3
136           are designed for use only by developers and generate HUGE amounts
137           of log data, most of which is extremely cryptic.
138
139           Note that specifying this parameter here will override the log
140           level parameter in the smb.conf file.
141
142       -V|--version
143           Prints the program version number.
144
145       -s|--configfile=<configuration file>
146           The file specified contains the configuration details required by
147           the server. The information in this file includes server-specific
148           information such as what printcap file to use, as well as
149           descriptions of all the services that the server is to provide. See
150           smb.conf for more information. The default configuration file name
151           is determined at compile time.
152
153       -l|--log-basename=logdirectory
154           Base directory name for log/debug files. The extension ".progname"
155           will be appended (e.g. log.smbclient, log.smbd, etc...). The log
156           file is never removed by the client.
157
158       --option=<name>=<value>
159           Set the smb.conf(5) option "<name>" to value "<value>" from the
160           command line. This overrides compiled-in defaults and options read
161           from the configuration file.
162
163       -N|--no-pass
164           If specified, this parameter suppresses the normal password prompt
165           from the client to the user. This is useful when accessing a
166           service that does not require a password.
167
168           Unless a password is specified on the command line or this
169           parameter is specified, the client will request a password.
170
171           If a password is specified on the command line and this option is
172           also defined the password on the command line will be silently
173           ignored and no password will be used.
174
175       -k|--kerberos
176           Try to authenticate with kerberos. Only useful in an Active
177           Directory environment.
178
179       -C|--use-ccache
180           Try to use the credentials cached by winbind.
181
182       -A|--authentication-file=filename
183           This option allows you to specify a file from which to read the
184           username and password used in the connection. The format of the
185           file is
186
187               username = <value>
188               password = <value>
189               domain   = <value>
190
191           Make certain that the permissions on the file restrict access from
192           unwanted users.
193
194       -U|--user=username[%password]
195           Sets the SMB username or username and password.
196
197           If %password is not specified, the user will be prompted. The
198           client will first check the USER environment variable, then the
199           LOGNAME variable and if either exists, the string is uppercased. If
200           these environmental variables are not found, the username GUEST is
201           used.
202
203           A third option is to use a credentials file which contains the
204           plaintext of the username and password. This option is mainly
205           provided for scripts where the admin does not wish to pass the
206           credentials on the command line or via environment variables. If
207           this method is used, make certain that the permissions on the file
208           restrict access from unwanted users. See the -A for more details.
209
210           Be cautious about including passwords in scripts. Also, on many
211           systems the command line of a running process may be seen via the
212           ps command. To be safe always allow rpcclient to prompt for a
213           password and type it in directly.
214
215       -S|--signing on|off|required
216           Set the client signing state.
217
218       -P|--machine-pass
219           Use stored machine account password.
220
221       -e|--encrypt
222           This command line parameter requires the remote server support the
223           UNIX extensions or that the SMB3 protocol has been selected.
224           Requests that the connection be encrypted. Negotiates SMB
225           encryption using either SMB3 or POSIX extensions via GSSAPI. Uses
226           the given credentials for the encryption negotiation (either
227           kerberos or NTLMv1/v2 if given domain/username/password triple.
228           Fails the connection if encryption cannot be negotiated.
229
230       --pw-nt-hash
231           The supplied password is the NT hash.
232
233       -n|--netbiosname <primary NetBIOS name>
234           This option allows you to override the NetBIOS name that Samba uses
235           for itself. This is identical to setting the netbios name parameter
236           in the smb.conf file. However, a command line setting will take
237           precedence over settings in smb.conf.
238
239       -i|--scope <scope>
240           This specifies a NetBIOS scope that nmblookup will use to
241           communicate with when generating NetBIOS names. For details on the
242           use of NetBIOS scopes, see rfc1001.txt and rfc1002.txt. NetBIOS
243           scopes are very rarely used, only set this parameter if you are the
244           system administrator in charge of all the NetBIOS systems you
245           communicate with.
246
247       -W|--workgroup=domain
248           Set the SMB domain of the username. This overrides the default
249           domain which is the domain defined in smb.conf. If the domain
250           specified is the same as the servers NetBIOS name, it causes the
251           client to log on using the servers local SAM (as opposed to the
252           Domain SAM).
253
254       -O|--socket-options socket options
255           TCP socket options to set on the client socket. See the socket
256           options parameter in the smb.conf manual page for the list of valid
257           options.
258
259       -?|--help
260           Print a summary of command line options.
261
262       --usage
263           Display brief usage message.
264

COMMANDS

266   LSARPC
267       lsaquery
268           Query info policy
269
270       lookupsids
271           Convert SIDs to names
272
273       lookupsids3
274           Convert SIDs to names
275
276       lookupsids_level
277           Convert SIDs to names
278
279       lookupnames
280           Convert names to SIDs
281
282       lookupnames4
283           Convert names to SIDs
284
285       lookupnames_level
286           Convert names to SIDs
287
288       enumtrust
289           Enumerate trusted domains
290
291       enumprivs
292           Enumerate privileges
293
294       getdispname
295           Get the privilege name
296
297       lsaenumsid
298           Enumerate the LSA SIDS
299
300       lsacreateaccount
301           Create a new lsa account
302
303       lsaenumprivsaccount
304           Enumerate the privileges of an SID
305
306       lsaenumacctrights
307           Enumerate the rights of an SID
308
309       lsaaddpriv
310           Assign a privilege to a SID
311
312       lsadelpriv
313           Revoke a privilege from a SID
314
315       lsaaddacctrights
316           Add rights to an account
317
318       lsaremoveacctrights
319           Remove rights from an account
320
321       lsalookupprivvalue
322           Get a privilege value given its name
323
324       lsaquerysecobj
325           Query LSA security object
326
327       lsaquerytrustdominfo
328           Query LSA trusted domains info (given a SID)
329
330       lsaquerytrustdominfobyname
331           Query LSA trusted domains info (given a name), only works for
332           Windows > 2k
333
334       lsaquerytrustdominfobysid
335           Query LSA trusted domains info (given a SID)
336
337       lsasettrustdominfo
338           Set LSA trusted domain info
339
340       getusername
341           Get username
342
343       createsecret
344           Create Secret
345
346       deletesecret
347           Delete Secret
348
349       querysecret
350           Query Secret
351
352       setsecret
353           Set Secret
354
355       retrieveprivatedata
356           Retrieve Private Data
357
358       storeprivatedata
359           Store Private Data
360
361       createtrustdom
362           Create Trusted Domain
363
364       deletetrustdom
365           Delete Trusted Domain
366
367   LSARPC-DS
368       dsroledominfo
369           Get Primary Domain Information
370
371   DFS
372       dfsversion
373           Query DFS support
374
375       dfsadd
376           Add a DFS share
377
378       dfsremove
379           Remove a DFS share
380
381       dfsgetinfo
382           Query DFS share info
383
384       dfsenum
385           Enumerate dfs shares
386
387       dfsenumex
388           Enumerate dfs shares
389
390   SHUTDOWN
391       shutdowninit
392           syntax: shutdown [-m message]
393
394       shutdownabort
395           syntax: shutdownabort
396
397   SRVSVC
398       srvinfo
399           Server query info
400
401       netshareenum
402           Enumerate shares
403
404       netshareenumall
405           Enumerate all shares
406
407       netsharegetinfo
408           Get Share Info
409
410       netsharesetinfo
411           Set Share Info
412
413       netsharesetdfsflags
414           Set DFS flags
415
416       netfileenum
417           Enumerate open files
418
419       netremotetod
420           Fetch remote time of day
421
422       netnamevalidate
423           Validate sharename
424
425       netfilegetsec
426           Get File security
427
428       netsessdel
429           Delete Session
430
431       netsessenum
432           Enumerate Sessions
433
434       netdiskenum
435           Enumerate Disks
436
437       netconnenum
438           Enumerate Connections
439
440       netshareadd
441           Add share
442
443       netsharedel
444           Delete share
445
446   SAMR
447       queryuser
448           Query user info
449
450       querygroup
451           Query group info
452
453       queryusergroups
454           Query user groups
455
456       queryuseraliases
457           Query user aliases
458
459       querygroupmem
460           Query group membership
461
462       queryaliasmem
463           Query alias membership
464
465       queryaliasinfo
466           Query alias info
467
468       deletealias
469           Delete an alias
470
471       querydispinfo
472           Query display info
473
474       querydispinfo2
475           Query display info
476
477       querydispinfo3
478           Query display info
479
480       querydominfo
481           Query domain info
482
483       enumdomusers
484           Enumerate domain users
485
486       enumdomgroups
487           Enumerate domain groups
488
489       enumalsgroups
490           Enumerate alias groups
491
492       enumdomains
493           Enumerate domains
494
495       createdomuser
496           Create domain user
497
498       createdomgroup
499           Create domain group
500
501       createdomalias
502           Create domain alias
503
504       samlookupnames
505           Look up names
506
507       samlookuprids
508           Look up names
509
510       deletedomgroup
511           Delete domain group
512
513       deletedomuser
514           Delete domain user
515
516       samquerysecobj
517           Query SAMR security object
518
519       getdompwinfo
520           Retrieve domain password info
521
522       getusrdompwinfo
523           Retrieve user domain password info
524
525       lookupdomain
526           Lookup Domain Name
527
528       chgpasswd
529           Change user password
530
531       chgpasswd2
532           Change user password
533
534       chgpasswd3
535           Change user password
536
537       getdispinfoidx
538           Get Display Information Index
539
540       setuserinfo
541           Set user info
542
543       setuserinfo2
544           Set user info2
545
546   SPOOLSS
547       adddriver <arch> <config> [<version>]
548           Execute an AddPrinterDriver() RPC to install the printer driver
549           information on the server. Note that the driver files should
550           already exist in the directory returned by getdriverdir. Possible
551           values for arch are the same as those for the getdriverdir command.
552           The config parameter is defined as follows:
553
554               Long Driver Name:\
555               Driver File Name:\
556               Data File Name:\
557               Config File Name:\
558               Help File Name:\
559               Language Monitor Name:\
560               Default Data Type:\
561               Comma Separated list of Files
562
563           Any empty fields should be enter as the string "NULL".
564
565           Samba does not need to support the concept of Print Monitors since
566           these only apply to local printers whose driver can make use of a
567           bi-directional link for communication. This field should be "NULL".
568           On a remote NT print server, the Print Monitor for a driver must
569           already be installed prior to adding the driver or else the RPC
570           will fail.
571
572           The version parameter lets you specify the printer driver version
573           number. If omitted, the default driver version for the specified
574           architecture will be used. This option can be used to upload
575           Windows 2000 (version 3) printer drivers.
576
577       addprinter <printername> <sharename> <drivername> <port>
578           Add a printer on the remote server. This printer will be
579           automatically shared. Be aware that the printer driver must already
580           be installed on the server (see adddriver) and the portmust be a
581           valid port name (see enumports.
582
583       deldriver <driver>
584           Delete the specified printer driver for all architectures. This
585           does not delete the actual driver files from the server, only the
586           entry from the server's list of drivers.
587
588       deldriverex <driver> [architecture] [version] [flags]
589           Delete the specified printer driver and optionally files associated
590           with the driver. You can limit this action to a specific
591           architecture and a specific version. If no architecture is given,
592           all driver files of that driver will be deleted.  flags correspond
593           to numeric DPD_* values, i.e. a value of 3 requests
594           (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION).
595
596       enumdata
597           Enumerate all printer setting data stored on the server. On Windows
598           NT clients, these values are stored in the registry, while Samba
599           servers store them in the printers TDB. This command corresponds to
600           the MS Platform SDK GetPrinterData() function (* This command is
601           currently unimplemented).
602
603       enumdataex
604           Enumerate printer data for a key
605
606       enumkey
607           Enumerate printer keys
608
609       enumjobs <printer>
610           List the jobs and status of a given printer. This command
611           corresponds to the MS Platform SDK EnumJobs() function
612
613       getjob
614           Get print job
615
616       setjob
617           Set print job
618
619       enumports [level]
620           Executes an EnumPorts() call using the specified info level.
621           Currently only info levels 1 and 2 are supported.
622
623       enumdrivers [level]
624           Execute an EnumPrinterDrivers() call. This lists the various
625           installed printer drivers for all architectures. Refer to the MS
626           Platform SDK documentation for more details of the various flags
627           and calling options. Currently supported info levels are 1, 2, and
628           3.
629
630       enumprinters [level]
631           Execute an EnumPrinters() call. This lists the various installed
632           and share printers. Refer to the MS Platform SDK documentation for
633           more details of the various flags and calling options. Currently
634           supported info levels are 1, 2 and 5.
635
636       getdata <printername> <valuename;>
637           Retrieve the data for a given printer setting. See the enumdata
638           command for more information. This command corresponds to the
639           GetPrinterData() MS Platform SDK function.
640
641       getdataex
642           Get printer driver data with keyname
643
644       getdriver <printername>
645           Retrieve the printer driver information (such as driver file,
646           config file, dependent files, etc...) for the given printer. This
647           command corresponds to the GetPrinterDriver() MS Platform SDK
648           function. Currently info level 1, 2, and 3 are supported.
649
650       getdriverdir <arch>
651           Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share
652           name and subdirectory for storing printer driver files for a given
653           architecture. Possible values for arch are "Windows 4.0" (for
654           Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows
655           Alpha_AXP", and "Windows NT R4000".
656
657       getdriverpackagepath
658           Get print driver package download directory
659
660       getprinter <printername>
661           Retrieve the current printer information. This command corresponds
662           to the GetPrinter() MS Platform SDK function.
663
664       openprinter <printername>
665           Execute an OpenPrinterEx() and ClosePrinter() RPC against a given
666           printer.
667
668       openprinter_ex <printername>
669           Open printer handle
670
671       setdriver <printername> <drivername>
672           Execute a SetPrinter() command to update the printer driver
673           associated with an installed printer. The printer driver must
674           already be correctly installed on the print server.
675
676           See also the enumprinters and enumdrivers commands for obtaining a
677           list of of installed printers and drivers.
678
679       getprintprocdir
680           Get print processor directory
681
682       addform
683           Add form
684
685       setform
686           Set form
687
688       getform
689           Get form
690
691       deleteform
692           Delete form
693
694       enumforms
695           Enumerate form
696
697       setprinter
698           Set printer comment
699
700       setprinterdata
701           Set REG_SZ printer data
702
703       setprintername <printername> <newprintername>
704           Set printer name
705
706       rffpcnex
707           Rffpcnex test
708
709       printercmp
710           Printer comparison test
711
712       enumprocs
713           Enumerate Print Processors
714
715       enumprocdatatypes
716           Enumerate Print Processor Data Types
717
718       enummonitors
719           Enumerate Print Monitors
720
721       createprinteric
722           Create Printer IC
723
724       playgdiscriptonprinteric
725           Create Printer IC
726
727       getcoreprinterdrivers
728           Get CorePrinterDriver
729
730       enumpermachineconnections
731           Enumerate Per Machine Connections
732
733       addpermachineconnection
734           Add Per Machine Connection
735
736       delpermachineconnection
737           Delete Per Machine Connection
738
739   NETLOGON
740       logonctrl2
741           Logon Control 2
742
743       getanydcname
744           Get trusted DC name
745
746       getdcname
747           Get trusted PDC name
748
749       dsr_getdcname
750           Get trusted DC name
751
752       dsr_getdcnameex
753           Get trusted DC name
754
755       dsr_getdcnameex2
756           Get trusted DC name
757
758       dsr_getsitename
759           Get sitename
760
761       dsr_getforesttrustinfo
762           Get Forest Trust Info
763
764       logonctrl
765           Logon Control
766
767       samlogon
768           Sam Logon
769
770       change_trust_pw
771           Change Trust Account Password
772
773       gettrustrid
774           Get trust rid
775
776       dsr_enumtrustdom
777           Enumerate trusted domains
778
779       dsenumdomtrusts
780           Enumerate all trusted domains in an AD forest
781
782       deregisterdnsrecords
783           Deregister DNS records
784
785       netrenumtrusteddomains
786           Enumerate trusted domains
787
788       netrenumtrusteddomainsex
789           Enumerate trusted domains
790
791       getdcsitecoverage
792           Get the Site-Coverage from a DC
793
794       capabilities
795           Return Capabilities
796
797       logongetdomaininfo
798           Return LogonGetDomainInfo
799
800   FSRVP
801       fss_is_path_sup
802           Check whether a share supports shadow-copy
803
804       fss_get_sup_version
805           Get supported FSRVP version from server
806
807       fss_create_expose
808           Request shadow-copy creation and exposure
809
810       fss_delete
811           Request shadow-copy share deletion
812
813       fss_has_shadow_copy
814           Check for an associated share shadow-copy
815
816       fss_get_mapping
817           Get shadow-copy share mapping information
818
819       fss_recovery_complete
820           Flag read-write snapshot as recovery complete,
821
822   CLUSAPI
823       clusapi_open_cluster
824           Open cluster
825
826       clusapi_get_cluster_name
827           Get cluster name
828
829       clusapi_get_cluster_version
830           Get cluster version
831
832       clusapi_get_quorum_resource
833           Get quorum resource
834
835       clusapi_create_enum
836           Create enum query
837
838       clusapi_create_enumex
839           Create enumex query
840
841       clusapi_open_resource
842           Open cluster resource
843
844       clusapi_online_resource
845           Set cluster resource online
846
847       clusapi_offline_resource
848           Set cluster resource offline
849
850       clusapi_get_resource_state
851           Get cluster resource state
852
853       clusapi_get_cluster_version2
854           Get cluster version2
855
856       clusapi_pause_node
857           Pause cluster node
858
859       clusapi_resume_node
860           Resume cluster node
861
862   DRSUAPI
863       dscracknames
864           Crack Name
865
866       dsgetdcinfo
867           Get Domain Controller Info
868
869       dsgetncchanges
870           Get NC Changes
871
872       dswriteaccountspn
873           Write Account SPN
874
875   ECHO
876       echoaddone
877           Add one to a number
878
879       echodata
880           Echo data
881
882       sinkdata
883           Sink data
884
885       sourcedata
886           Source data
887
888   EPMAPPER
889       epmmap
890           Map a binding
891
892       epmlookup
893           Lookup bindings
894
895   EVENTLOG
896       eventlog_readlog
897           Read Eventlog
898
899       eventlog_numrecord
900           Get number of records
901
902       eventlog_oldestrecord
903           Get oldest record
904
905       eventlog_reportevent
906           Report event
907
908       eventlog_reporteventsource
909           Report event and source
910
911       eventlog_registerevsource
912           Register event source
913
914       eventlog_backuplog
915           Backup Eventlog File
916
917       eventlog_loginfo
918           Get Eventlog Information
919
920   IRemoteWinspool
921       winspool_AsyncOpenPrinter
922           Open printer handle
923
924       winspool_AsyncCorePrinterDriverInstalled
925           Query Core Printer Driver Installed
926
927   NTSVCS
928       ntsvcs_getversion
929           Query NTSVCS version
930
931       ntsvcs_validatedevinst
932           Query NTSVCS device instance
933
934       ntsvcs_hwprofflags
935           Query NTSVCS HW prof flags
936
937       ntsvcs_hwprofinfo
938           Query NTSVCS HW prof info
939
940       ntsvcs_getdevregprop
941           Query NTSVCS device registry property
942
943       ntsvcs_getdevlistsize
944           Query NTSVCS device list size
945
946       ntsvcs_getdevlist
947           Query NTSVCS device list
948
949   MDSSVC
950       fetch_properties
951           Fetch connection properties
952
953       fetch_attributes
954           Fetch attributes for a CNID
955
956   WINREG
957       winreg_enumkey
958           Enumerate Keys
959
960       querymultiplevalues
961           Query multiple values
962
963       querymultiplevalues2
964           Query multiple values
965
966   WITNESS
967       GetInterfaceList
968           List the interfaces to which witness client connections can be made
969
970       Register
971           Register for resource state change notifications of a NetName and
972           IPAddress
973
974       UnRegister
975           Unregister for notifications from the server
976
977       AsyncNotify
978           Request notification of registered resource changes from the server
979
980       RegisterEx
981           Register for resource state change notifications of a NetName,
982           ShareName and multiple IPAddresses
983
984   WKSSVC
985       wkssvc_wkstagetinfo
986           Query WKSSVC Workstation Information
987
988       wkssvc_getjoininformation
989           Query WKSSVC Join Information
990
991       wkssvc_messagebuffersend
992           Send WKSSVC message
993
994       wkssvc_enumeratecomputernames
995           Enumerate WKSSVC computer names
996
997       wkssvc_enumerateusers
998           Enumerate WKSSVC users
999
1000   GENERAL OPTIONS
1001       help
1002           Get help on commands
1003
1004       ?
1005           Get help on commands
1006
1007       debuglevel
1008           Set debug level
1009
1010       debug
1011           Set debug level
1012
1013       list
1014           List available commands on pipe
1015
1016       exit
1017           Exit program
1018
1019       quit
1020           Exit program
1021
1022       sign
1023           Force RPC pipe connections to be signed
1024
1025       seal
1026           Force RPC pipe connections to be sealed
1027
1028       packet
1029           Force RPC pipe connections with packet authentication level
1030
1031       schannel
1032           Force RPC pipe connections to be sealed with 'schannel'. Force RPC
1033           pipe connections to be sealed with 'schannel'. Assumes valid
1034           machine account to this domain controller.
1035
1036       schannelsign
1037           Force RPC pipe connections to be signed (not sealed) with
1038           'schannel'. Assumes valid machine account to this domain
1039           controller.
1040
1041       timeout
1042           Set timeout (in milliseconds) for RPC operations
1043
1044       transport
1045           Choose ncacn transport for RPC operations
1046
1047       none
1048           Force RPC pipe connections to have no special properties
1049

BUGS

1051       rpcclient is designed as a developer testing tool and may not be robust
1052       in certain areas (such as command line parsing). It has been known to
1053       generate a core dump upon failures when invalid parameters where passed
1054       to the interpreter.
1055
1056       From Luke Leighton's original rpcclient man page:
1057
1058       WARNING!  The MSRPC over SMB code has been developed from examining
1059       Network traces. No documentation is available from the original
1060       creators (Microsoft) on how MSRPC over SMB works, or how the individual
1061       MSRPC services work. Microsoft's implementation of these services has
1062       been demonstrated (and reported) to be... a bit flaky in places.
1063
1064       The development of Samba's implementation is also a bit rough, and as
1065       more of the services are understood, it can even result in versions of
1066       smbd(8) and rpcclient(1) that are incompatible for some commands or
1067       services. Additionally, the developers are sending reports to
1068       Microsoft, and problems found or reported to Microsoft are fixed in
1069       Service Packs, which may result in incompatibilities.
1070

VERSION

1072       This man page is part of version 4.14.5 of the Samba suite.
1073

AUTHOR

1075       The original Samba software and related utilities were created by
1076       Andrew Tridgell. Samba is now developed by the Samba Team as an Open
1077       Source project similar to the way the Linux kernel is developed.
1078
1079       The original rpcclient man page was written by Matthew Geddes, Luke
1080       Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion
1081       to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to
1082       DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.
1083
1084
1085
1086Samba 4.14.5                      06/01/2021                      RPCCLIENT(1)
Impressum