1RPCCLIENT(1)                     User Commands                    RPCCLIENT(1)
2
3
4

NAME

6       rpcclient - tool for executing client side MS-RPC functions
7

SYNOPSIS

9       rpcclient [-c|--command=COMMANDS] [-I|--dest-ip=IP] [-p|--port=PORT]
10        [-?|--help] [--usage] [-d|--debuglevel=DEBUGLEVEL] [--debug-stdout]
11        [--configfile=CONFIGFILE] [--option=name=value]
12        [-l|--log-basename=LOGFILEBASE] [--leak-report] [--leak-report-full]
13        [-R|--name-resolve=NAME-RESOLVE-ORDER]
14        [-O|--socket-options=SOCKETOPTIONS] [-m|--max-protocol=MAXPROTOCOL]
15        [-n|--netbiosname=NETBIOSNAME] [--netbios-scope=SCOPE]
16        [-W|--workgroup=WORKGROUP] [--realm=REALM]
17        [-U|--user=[DOMAIN/]USERNAME[%PASSWORD]] [-N|--no-pass]
18        [--password=STRING] [--pw-nt-hash] [-A|--authentication-file=FILE]
19        [-P|--machine-pass] [--simple-bind-dn=DN]
20        [--use-kerberos=desired|required|off] [--use-krb5-ccache=CCACHE]
21        [--use-winbind-ccache] [--client-protection=sign|encrypt|off]
22        [-V|--version] {BINDING-STRING|HOST}
23

DESCRIPTION

25       This tool is part of the samba(7) suite.
26
27       rpcclient is a utility initially developed to test MS-RPC functionality
28       in Samba itself. It has undergone several stages of development and
29       stability. Many system administrators have now written scripts around
30       it to manage Windows NT clients from their UNIX workstation.
31

OPTIONS

33       BINDING-STRING|HOST
34           When connecting to a dcerpc service you need to specify a binding
35           string.
36
37           The format is:
38
39           TRANSPORT:host[options]
40
41           where TRANSPORT is either ncacn_np (named pipes) for SMB or
42           ncacn_ip_tcp for DCERPC over TCP/IP.
43
44           "host" is an IP or hostname or netbios name. If the binding string
45           identifies the server side of an endpoint, "host" may be an empty
46           string. See below for more details.
47
48           "options" can include a SMB pipe name if using the ncacn_np
49           transport or a TCP port number if using the ncacn_ip_tcp transport,
50           otherwise they will be auto-determined.
51
52           Examples:
53
54ncacn_ip_tcp:samba.example.com[1024]
55
56ncacn_ip_tcp:samba.example.com[sign,seal,krb5]
57
58ncacn_ip_tcp:samba.example.com[sign,spnego]
59
60ncacn_np:samba.example.com
61
62ncacn_np:samba.example.com[samr]
63
64ncacn_np:samba.example.com[samr,sign,print]
65
66ncalrpc:/path/to/unix/socket
67
68//SAMBA
69
70           The supported transports are:
71
72ncacn_np - Connect using named pipes
73
74ncacn_ip_tcp - Connect over TCP/IP
75
76ncalrpc - Connect over local RPC (unix sockets)
77
78           The supported options are:
79
80sign - Use RPC integrity authentication level
81
82seal - Enable RPC privacy (encryption) authentication
83                      level
84
85connect - Use RPC connect level authentication (auth,
86                      but no sign or seal)
87
88packet - Use RPC packet authentication level
89
90spnego - Use SPNEGO instead of NTLMSSP authentication
91
92ntlm - Use plain NTLM instead of SPNEGO or NTLMSSP
93
94krb5 - Use Kerberos instead of NTLMSSP authentication
95
96schannel - Create a schannel connection
97
98smb1 - Use SMB1 for named pipes
99
100smb2 - Use SMB2/3 for named pipes
101
102validate - Enable the NDR validator
103
104print - Enable debug output of packets
105
106padcheck - Check reply data for non-zero pad bytes
107
108bigendian - Use big endian for RPC
109
110ndr64 - Use NDR64 for RPC
111
112
113       -c|--command=<command string>
114           Execute semicolon separated commands (listed below)
115
116       -I|--dest-ip IP-address
117           IP address is the address of the server to connect to. It should be
118           specified in standard "a.b.c.d" notation.
119
120           Normally the client would attempt to locate a named SMB/CIFS server
121           by looking it up via the NetBIOS name resolution mechanism
122           described above in the name resolve order parameter above. Using
123           this parameter will force the client to assume that the server is
124           on the machine with the specified IP address and the NetBIOS name
125           component of the resource being connected to will be ignored.
126
127           There is no default for this parameter. If not supplied, it will be
128           determined automatically by the client as described above.
129
130       -p|--port port
131           This number is the TCP port number that will be used when making
132           connections to the server. The standard (well-known) TCP port
133           number for an SMB/CIFS server is 139, which is the default.
134
135       -?|--help
136           Print a summary of command line options.
137
138       --usage
139           Display brief usage message.
140
141       -d|--debuglevel=DEBUGLEVEL
142           level is an integer from 0 to 10. The default value if this
143           parameter is not specified is 1 for client applications.
144
145           The higher this value, the more detail will be logged to the log
146           files about the activities of the server. At level 0, only critical
147           errors and serious warnings will be logged. Level 1 is a reasonable
148           level for day-to-day running - it generates a small amount of
149           information about operations carried out.
150
151           Levels above 1 will generate considerable amounts of log data, and
152           should only be used when investigating a problem. Levels above 3
153           are designed for use only by developers and generate HUGE amounts
154           of log data, most of which is extremely cryptic.
155
156           Note that specifying this parameter here will override the log
157           level parameter in the smb.conf file.
158
159       --debug-stdout
160           This will redirect debug output to STDOUT. By default all clients
161           are logging to STDERR.
162
163       --configfile=<configuration file>
164           The file specified contains the configuration details required by
165           the client. The information in this file can be general for client
166           and server or only provide client specific like options such as
167           client smb encrypt. See smb.conf for more information. The default
168           configuration file name is determined at compile time.
169
170       --option=<name>=<value>
171           Set the smb.conf(5) option "<name>" to value "<value>" from the
172           command line. This overrides compiled-in defaults and options read
173           from the configuration file. If a name or a value includes a space,
174           wrap whole --option=name=value into quotes.
175
176       -l|--log-basename=logdirectory
177           Base directory name for log/debug files. The extension ".progname"
178           will be appended (e.g. log.smbclient, log.smbd, etc...). The log
179           file is never removed by the client.
180
181       --leak-report
182           Enable talloc leak reporting on exit.
183
184       --leak-report-full
185           Enable full talloc leak reporting on exit.
186
187       -V|--version
188           Prints the program version number.
189
190       -R|--name-resolve=NAME-RESOLVE-ORDER
191           This option is used to determine what naming services and in what
192           order to resolve host names to IP addresses. The option takes a
193           space-separated string of different name resolution options. The
194           best ist to wrap the whole --name-resolve=NAME-RESOLVE-ORDER into
195           quotes.
196
197           The options are: "lmhosts", "host", "wins" and "bcast". They cause
198           names to be resolved as follows:
199
200lmhosts: Lookup an IP address in the Samba lmhosts file.
201                      If the line in lmhosts has no name type attached to the
202                      NetBIOS name (see the lmhosts(5) for details) then any
203                      name type matches for lookup.
204
205host: Do a standard host name to IP address resolution,
206                      using the system /etc/hosts, NIS, or DNS lookups. This
207                      method of name resolution is operating system dependent,
208                      for instance on IRIX or Solaris this may be controlled
209                      by the /etc/nsswitch.conf file). Note that this method
210                      is only used if the NetBIOS name type being queried is
211                      the 0x20 (server) name type, otherwise it is ignored.
212
213wins: Query a name with the IP address listed in the
214                      wins server parameter. If no WINS server has been
215                      specified this method will be ignored.
216
217bcast: Do a broadcast on each of the known local
218                      interfaces listed in the interfaces parameter. This is
219                      the least reliable of the name resolution methods as it
220                      depends on the target host being on a locally connected
221                      subnet.
222
223           If this parameter is not set then the name resolve order defined in
224           the smb.conf file parameter (name resolve order) will be used.
225
226           The default order is lmhosts, host, wins, bcast. Without this
227           parameter or any entry in the name resolve order parameter of the
228           smb.conf file, the name resolution methods will be attempted in
229           this order.
230
231       -O|--socket-options=SOCKETOPTIONS
232           TCP socket options to set on the client socket. See the socket
233           options parameter in the smb.conf manual page for the list of valid
234           options.
235
236       -m|--max-protocol=MAXPROTOCOL
237           The value of the parameter (a string) is the highest protocol level
238           that will be supported by the client.
239
240           Note that specifying this parameter here will override the client
241           max protocol parameter in the smb.conf file.
242
243       -n|--netbiosname=NETBIOSNAME
244           This option allows you to override the NetBIOS name that Samba uses
245           for itself. This is identical to setting the netbios name parameter
246           in the smb.conf file. However, a command line setting will take
247           precedence over settings in smb.conf.
248
249       --netbios-scope=SCOPE
250           This specifies a NetBIOS scope that nmblookup will use to
251           communicate with when generating NetBIOS names. For details on the
252           use of NetBIOS scopes, see rfc1001.txt and rfc1002.txt. NetBIOS
253           scopes are very rarely used, only set this parameter if you are the
254           system administrator in charge of all the NetBIOS systems you
255           communicate with.
256
257       -W|--workgroup=WORKGROUP
258           Set the SMB domain of the username. This overrides the default
259           domain which is the domain defined in smb.conf. If the domain
260           specified is the same as the servers NetBIOS name, it causes the
261           client to log on using the servers local SAM (as opposed to the
262           Domain SAM).
263
264           Note that specifying this parameter here will override the
265           workgroup parameter in the smb.conf file.
266
267       -r|--realm=REALM
268           Set the realm for the domain.
269
270           Note that specifying this parameter here will override the realm
271           parameter in the smb.conf file.
272
273       -U|--user=[DOMAIN\]USERNAME[%PASSWORD]
274           Sets the SMB username or username and password.
275
276           If %PASSWORD is not specified, the user will be prompted. The
277           client will first check the USER environment variable (which is
278           also permitted to also contain the password seperated by a %), then
279           the LOGNAME variable (which is not permitted to contain a password)
280           and if either exists, the value is used. If these environmental
281           variables are not found, the username found in a Kerberos
282           Credentials cache may be used.
283
284           A third option is to use a credentials file which contains the
285           plaintext of the username and password. This option is mainly
286           provided for scripts where the admin does not wish to pass the
287           credentials on the command line or via environment variables. If
288           this method is used, make certain that the permissions on the file
289           restrict access from unwanted users. See the -A for more details.
290
291           Be cautious about including passwords in scripts or passing
292           user-supplied values onto the command line. For security it is
293           better to let the Samba client tool ask for the password if needed,
294           or obtain the password once with kinit.
295
296           While Samba will attempt to scrub the password from the process
297           title (as seen in ps), this is after startup and so is subject to a
298           race.
299
300       -N|--no-pass
301           If specified, this parameter suppresses the normal password prompt
302           from the client to the user. This is useful when accessing a
303           service that does not require a password.
304
305           Unless a password is specified on the command line or this
306           parameter is specified, the client will request a password.
307
308           If a password is specified on the command line and this option is
309           also defined the password on the command line will be silently
310           ignored and no password will be used.
311
312       --password
313           Specify the password on the commandline.
314
315           Be cautious about including passwords in scripts or passing
316           user-supplied values onto the command line. For security it is
317           better to let the Samba client tool ask for the password if needed,
318           or obtain the password once with kinit.
319
320           If --password is not specified, the tool will check the PASSWD
321           environment variable, followed by PASSWD_FD which is expected to
322           contain an open file descriptor (FD) number.
323
324           Finally it will check PASSWD_FILE (containing a file path to be
325           opened). The file should only contain the password. Make certain
326           that the permissions on the file restrict access from unwanted
327           users!
328
329           While Samba will attempt to scrub the password from the process
330           title (as seen in ps), this is after startup and so is subject to a
331           race.
332
333       --pw-nt-hash
334           The supplied password is the NT hash.
335
336       -A|--authentication-file=filename
337           This option allows you to specify a file from which to read the
338           username and password used in the connection. The format of the
339           file is:
340
341                                   username = <value>
342                                   password = <value>
343                                   domain   = <value>
344
345
346           Make certain that the permissions on the file restrict access from
347           unwanted users!
348
349       -P|--machine-pass
350           Use stored machine account password.
351
352       --simple-bind-dn=DN
353           DN to use for a simple bind.
354
355       --use-kerberos=desired|required|off
356           This parameter determines whether Samba client tools will try to
357           authenticate using Kerberos. For Kerberos authentication you need
358           to use dns names instead of IP addresses when connnecting to a
359           service.
360
361           Note that specifying this parameter here will override the client
362           use kerberos parameter in the smb.conf file.
363
364       --use-krb5-ccache=CCACHE
365           Specifies the credential cache location for Kerberos
366           authentication.
367
368           This will set --use-kerberos=required too.
369
370       --use-winbind-ccache
371           Try to use the credential cache by winbind.
372
373       --client-protection=sign|encrypt|off
374           Sets the connection protection the client tool should use.
375
376           Note that specifying this parameter here will override the client
377           protection parameter in the smb.conf file.
378
379           In case you need more fine grained control you can use:
380           --option=clientsmbencrypt=OPTION, --option=clientipcsigning=OPTION,
381           --option=clientsigning=OPTION.
382

COMMANDS

384   LSARPC
385       lsaquery
386           Query info policy
387
388       lookupsids
389           Convert SIDs to names
390
391       lookupsids3
392           Convert SIDs to names
393
394       lookupsids_level
395           Convert SIDs to names
396
397       lookupnames
398           Convert names to SIDs
399
400       lookupnames4
401           Convert names to SIDs
402
403       lookupnames_level
404           Convert names to SIDs
405
406       enumtrust
407           Enumerate trusted domains
408
409       enumprivs
410           Enumerate privileges
411
412       getdispname
413           Get the privilege name
414
415       lsaenumsid
416           Enumerate the LSA SIDS
417
418       lsacreateaccount
419           Create a new lsa account
420
421       lsaenumprivsaccount
422           Enumerate the privileges of an SID
423
424       lsaenumacctrights
425           Enumerate the rights of an SID
426
427       lsaaddpriv
428           Assign a privilege to a SID
429
430       lsadelpriv
431           Revoke a privilege from a SID
432
433       lsaaddacctrights
434           Add rights to an account
435
436       lsaremoveacctrights
437           Remove rights from an account
438
439       lsalookupprivvalue
440           Get a privilege value given its name
441
442       lsaquerysecobj
443           Query LSA security object
444
445       lsaquerytrustdominfo
446           Query LSA trusted domains info (given a SID)
447
448       lsaquerytrustdominfobyname
449           Query LSA trusted domains info (given a name), only works for
450           Windows > 2k
451
452       lsaquerytrustdominfobysid
453           Query LSA trusted domains info (given a SID)
454
455       lsasettrustdominfo
456           Set LSA trusted domain info
457
458       getusername
459           Get username
460
461       createsecret
462           Create Secret
463
464       deletesecret
465           Delete Secret
466
467       querysecret
468           Query Secret
469
470       setsecret
471           Set Secret
472
473       retrieveprivatedata
474           Retrieve Private Data
475
476       storeprivatedata
477           Store Private Data
478
479       createtrustdom
480           Create Trusted Domain
481
482       deletetrustdom
483           Delete Trusted Domain
484
485   LSARPC-DS
486       dsroledominfo
487           Get Primary Domain Information
488
489   DFS
490       dfsversion
491           Query DFS support
492
493       dfsadd
494           Add a DFS share
495
496       dfsremove
497           Remove a DFS share
498
499       dfsgetinfo
500           Query DFS share info
501
502       dfsenum
503           Enumerate dfs shares
504
505       dfsenumex
506           Enumerate dfs shares
507
508   SHUTDOWN
509       shutdowninit
510           syntax: shutdown [-m message]
511
512       shutdownabort
513           syntax: shutdownabort
514
515   SRVSVC
516       srvinfo
517           Server query info
518
519       netshareenum
520           Enumerate shares
521
522       netshareenumall
523           Enumerate all shares
524
525       netsharegetinfo
526           Get Share Info
527
528       netsharesetinfo
529           Set Share Info
530
531       netsharesetdfsflags
532           Set DFS flags
533
534       netfileenum
535           Enumerate open files
536
537       netremotetod
538           Fetch remote time of day
539
540       netnamevalidate
541           Validate sharename
542
543       netfilegetsec
544           Get File security
545
546       netsessdel
547           Delete Session
548
549       netsessenum
550           Enumerate Sessions
551
552       netdiskenum
553           Enumerate Disks
554
555       netconnenum
556           Enumerate Connections
557
558       netshareadd
559           Add share
560
561       netsharedel
562           Delete share
563
564   SAMR
565       queryuser
566           Query user info
567
568       querygroup
569           Query group info
570
571       queryusergroups
572           Query user groups
573
574       queryuseraliases
575           Query user aliases
576
577       querygroupmem
578           Query group membership
579
580       queryaliasmem
581           Query alias membership
582
583       queryaliasinfo
584           Query alias info
585
586       deletealias
587           Delete an alias
588
589       querydispinfo
590           Query display info
591
592       querydispinfo2
593           Query display info
594
595       querydispinfo3
596           Query display info
597
598       querydominfo
599           Query domain info
600
601       enumdomusers
602           Enumerate domain users
603
604       enumdomgroups
605           Enumerate domain groups
606
607       enumalsgroups
608           Enumerate alias groups
609
610       enumdomains
611           Enumerate domains
612
613       createdomuser
614           Create domain user
615
616       createdomgroup
617           Create domain group
618
619       createdomalias
620           Create domain alias
621
622       samlookupnames
623           Look up names
624
625       samlookuprids
626           Look up names
627
628       deletedomgroup
629           Delete domain group
630
631       deletedomuser
632           Delete domain user
633
634       samquerysecobj
635           Query SAMR security object
636
637       getdompwinfo
638           Retrieve domain password info
639
640       getusrdompwinfo
641           Retrieve user domain password info
642
643       lookupdomain
644           Lookup Domain Name
645
646       chgpasswd
647           Change user password
648
649       chgpasswd2
650           Change user password
651
652       chgpasswd3
653           Change user password
654
655       getdispinfoidx
656           Get Display Information Index
657
658       setuserinfo
659           Set user info
660
661       setuserinfo2
662           Set user info2
663
664   SPOOLSS
665       adddriver <arch> <config> [<version>]
666           Execute an AddPrinterDriver() RPC to install the printer driver
667           information on the server. Note that the driver files should
668           already exist in the directory returned by getdriverdir. Possible
669           values for arch are the same as those for the getdriverdir command.
670           The config parameter is defined as follows:
671
672               Long Driver Name:\
673               Driver File Name:\
674               Data File Name:\
675               Config File Name:\
676               Help File Name:\
677               Language Monitor Name:\
678               Default Data Type:\
679               Comma Separated list of Files
680
681           Any empty fields should be enter as the string "NULL".
682
683           Samba does not need to support the concept of Print Monitors since
684           these only apply to local printers whose driver can make use of a
685           bi-directional link for communication. This field should be "NULL".
686           On a remote NT print server, the Print Monitor for a driver must
687           already be installed prior to adding the driver or else the RPC
688           will fail.
689
690           The version parameter lets you specify the printer driver version
691           number. If omitted, the default driver version for the specified
692           architecture will be used. This option can be used to upload
693           Windows 2000 (version 3) printer drivers.
694
695       addprinter <printername> <sharename> <drivername> <port>
696           Add a printer on the remote server. This printer will be
697           automatically shared. Be aware that the printer driver must already
698           be installed on the server (see adddriver) and the portmust be a
699           valid port name (see enumports.
700
701       deldriver <driver>
702           Delete the specified printer driver for all architectures. This
703           does not delete the actual driver files from the server, only the
704           entry from the server's list of drivers.
705
706       deldriverex <driver> [architecture] [version] [flags]
707           Delete the specified printer driver and optionally files associated
708           with the driver. You can limit this action to a specific
709           architecture and a specific version. If no architecture is given,
710           all driver files of that driver will be deleted.  flags correspond
711           to numeric DPD_* values, i.e. a value of 3 requests
712           (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION).
713
714       enumdata
715           Enumerate all printer setting data stored on the server. On Windows
716           NT clients, these values are stored in the registry, while Samba
717           servers store them in the printers TDB. This command corresponds to
718           the MS Platform SDK GetPrinterData() function (* This command is
719           currently unimplemented).
720
721       enumdataex
722           Enumerate printer data for a key
723
724       enumkey
725           Enumerate printer keys
726
727       enumjobs <printer>
728           List the jobs and status of a given printer. This command
729           corresponds to the MS Platform SDK EnumJobs() function
730
731       getjob
732           Get print job
733
734       setjob
735           Set print job
736
737       enumports [level]
738           Executes an EnumPorts() call using the specified info level.
739           Currently only info levels 1 and 2 are supported.
740
741       enumdrivers [level]
742           Execute an EnumPrinterDrivers() call. This lists the various
743           installed printer drivers for all architectures. Refer to the MS
744           Platform SDK documentation for more details of the various flags
745           and calling options. Currently supported info levels are 1, 2, and
746           3.
747
748       enumprinters [level]
749           Execute an EnumPrinters() call. This lists the various installed
750           and share printers. Refer to the MS Platform SDK documentation for
751           more details of the various flags and calling options. Currently
752           supported info levels are 1, 2 and 5.
753
754       getdata <printername> <valuename;>
755           Retrieve the data for a given printer setting. See the enumdata
756           command for more information. This command corresponds to the
757           GetPrinterData() MS Platform SDK function.
758
759       getdataex
760           Get printer driver data with keyname
761
762       getdriver <printername>
763           Retrieve the printer driver information (such as driver file,
764           config file, dependent files, etc...) for the given printer. This
765           command corresponds to the GetPrinterDriver() MS Platform SDK
766           function. Currently info level 1, 2, and 3 are supported.
767
768       getdriverdir <arch>
769           Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share
770           name and subdirectory for storing printer driver files for a given
771           architecture. Possible values for arch are "Windows 4.0" (for
772           Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows
773           Alpha_AXP", and "Windows NT R4000".
774
775       getdriverpackagepath
776           Get print driver package download directory
777
778       getprinter <printername>
779           Retrieve the current printer information. This command corresponds
780           to the GetPrinter() MS Platform SDK function.
781
782       openprinter <printername>
783           Execute an OpenPrinterEx() and ClosePrinter() RPC against a given
784           printer.
785
786       openprinter_ex <printername>
787           Open printer handle
788
789       setdriver <printername> <drivername>
790           Execute a SetPrinter() command to update the printer driver
791           associated with an installed printer. The printer driver must
792           already be correctly installed on the print server.
793
794           See also the enumprinters and enumdrivers commands for obtaining a
795           list of of installed printers and drivers.
796
797       getprintprocdir
798           Get print processor directory
799
800       addform
801           Add form
802
803       setform
804           Set form
805
806       getform
807           Get form
808
809       deleteform
810           Delete form
811
812       enumforms
813           Enumerate form
814
815       setprinter
816           Set printer comment
817
818       setprinterdata
819           Set REG_SZ printer data
820
821       setprintername <printername> <newprintername>
822           Set printer name
823
824       rffpcnex
825           Rffpcnex test
826
827       printercmp
828           Printer comparison test
829
830       enumprocs
831           Enumerate Print Processors
832
833       enumprocdatatypes
834           Enumerate Print Processor Data Types
835
836       enummonitors
837           Enumerate Print Monitors
838
839       createprinteric
840           Create Printer IC
841
842       playgdiscriptonprinteric
843           Create Printer IC
844
845       getcoreprinterdrivers
846           Get CorePrinterDriver
847
848       enumpermachineconnections
849           Enumerate Per Machine Connections
850
851       addpermachineconnection
852           Add Per Machine Connection
853
854       delpermachineconnection
855           Delete Per Machine Connection
856
857   NETLOGON
858       logonctrl2
859           Logon Control 2
860
861       getanydcname
862           Get trusted DC name
863
864       getdcname
865           Get trusted PDC name
866
867       dsr_getdcname
868           Get trusted DC name
869
870       dsr_getdcnameex
871           Get trusted DC name
872
873       dsr_getdcnameex2
874           Get trusted DC name
875
876       dsr_getsitename
877           Get sitename
878
879       dsr_getforesttrustinfo
880           Get Forest Trust Info
881
882       logonctrl
883           Logon Control
884
885       samlogon
886           Sam Logon
887
888       change_trust_pw
889           Change Trust Account Password
890
891       gettrustrid
892           Get trust rid
893
894       dsr_enumtrustdom
895           Enumerate trusted domains
896
897       dsenumdomtrusts
898           Enumerate all trusted domains in an AD forest
899
900       deregisterdnsrecords
901           Deregister DNS records
902
903       netrenumtrusteddomains
904           Enumerate trusted domains
905
906       netrenumtrusteddomainsex
907           Enumerate trusted domains
908
909       getdcsitecoverage
910           Get the Site-Coverage from a DC
911
912       capabilities
913           Return Capabilities
914
915       logongetdomaininfo
916           Return LogonGetDomainInfo
917
918   FSRVP
919       fss_is_path_sup
920           Check whether a share supports shadow-copy
921
922       fss_get_sup_version
923           Get supported FSRVP version from server
924
925       fss_create_expose
926           Request shadow-copy creation and exposure
927
928       fss_delete
929           Request shadow-copy share deletion
930
931       fss_has_shadow_copy
932           Check for an associated share shadow-copy
933
934       fss_get_mapping
935           Get shadow-copy share mapping information
936
937       fss_recovery_complete
938           Flag read-write snapshot as recovery complete,
939
940   CLUSAPI
941       clusapi_open_cluster
942           Open cluster
943
944       clusapi_get_cluster_name
945           Get cluster name
946
947       clusapi_get_cluster_version
948           Get cluster version
949
950       clusapi_get_quorum_resource
951           Get quorum resource
952
953       clusapi_create_enum
954           Create enum query
955
956       clusapi_create_enumex
957           Create enumex query
958
959       clusapi_open_resource
960           Open cluster resource
961
962       clusapi_online_resource
963           Set cluster resource online
964
965       clusapi_offline_resource
966           Set cluster resource offline
967
968       clusapi_get_resource_state
969           Get cluster resource state
970
971       clusapi_get_cluster_version2
972           Get cluster version2
973
974       clusapi_pause_node
975           Pause cluster node
976
977       clusapi_resume_node
978           Resume cluster node
979
980   DRSUAPI
981       dscracknames
982           Crack Name
983
984       dsgetdcinfo
985           Get Domain Controller Info
986
987       dsgetncchanges
988           Get NC Changes
989
990       dswriteaccountspn
991           Write Account SPN
992
993   ECHO
994       echoaddone
995           Add one to a number
996
997       echodata
998           Echo data
999
1000       sinkdata
1001           Sink data
1002
1003       sourcedata
1004           Source data
1005
1006   EPMAPPER
1007       epmmap
1008           Map a binding
1009
1010       epmlookup
1011           Lookup bindings
1012
1013   EVENTLOG
1014       eventlog_readlog
1015           Read Eventlog
1016
1017       eventlog_numrecord
1018           Get number of records
1019
1020       eventlog_oldestrecord
1021           Get oldest record
1022
1023       eventlog_reportevent
1024           Report event
1025
1026       eventlog_reporteventsource
1027           Report event and source
1028
1029       eventlog_registerevsource
1030           Register event source
1031
1032       eventlog_backuplog
1033           Backup Eventlog File
1034
1035       eventlog_loginfo
1036           Get Eventlog Information
1037
1038   IRemoteWinspool
1039       winspool_AsyncOpenPrinter
1040           Open printer handle
1041
1042       winspool_AsyncCorePrinterDriverInstalled
1043           Query Core Printer Driver Installed
1044
1045   NTSVCS
1046       ntsvcs_getversion
1047           Query NTSVCS version
1048
1049       ntsvcs_validatedevinst
1050           Query NTSVCS device instance
1051
1052       ntsvcs_hwprofflags
1053           Query NTSVCS HW prof flags
1054
1055       ntsvcs_hwprofinfo
1056           Query NTSVCS HW prof info
1057
1058       ntsvcs_getdevregprop
1059           Query NTSVCS device registry property
1060
1061       ntsvcs_getdevlistsize
1062           Query NTSVCS device list size
1063
1064       ntsvcs_getdevlist
1065           Query NTSVCS device list
1066
1067   MDSSVC
1068       fetch_properties
1069           Fetch connection properties
1070
1071       fetch_attributes
1072           Fetch attributes for a CNID
1073
1074   WINREG
1075       winreg_enumkey
1076           Enumerate Keys
1077
1078       querymultiplevalues
1079           Query multiple values
1080
1081       querymultiplevalues2
1082           Query multiple values
1083
1084   WITNESS
1085       GetInterfaceList
1086           List the interfaces to which witness client connections can be made
1087
1088       Register
1089           Register for resource state change notifications of a NetName and
1090           IPAddress
1091
1092       UnRegister
1093           Unregister for notifications from the server
1094
1095       AsyncNotify
1096           Request notification of registered resource changes from the server
1097
1098       RegisterEx
1099           Register for resource state change notifications of a NetName,
1100           ShareName and multiple IPAddresses
1101
1102   WKSSVC
1103       wkssvc_wkstagetinfo
1104           Query WKSSVC Workstation Information
1105
1106       wkssvc_getjoininformation
1107           Query WKSSVC Join Information
1108
1109       wkssvc_messagebuffersend
1110           Send WKSSVC message
1111
1112       wkssvc_enumeratecomputernames
1113           Enumerate WKSSVC computer names
1114
1115       wkssvc_enumerateusers
1116           Enumerate WKSSVC users
1117
1118   GENERAL OPTIONS
1119       help
1120           Get help on commands
1121
1122       ?
1123           Get help on commands
1124
1125       debuglevel
1126           Set debug level
1127
1128       debug
1129           Set debug level
1130
1131       list
1132           List available commands on pipe
1133
1134       exit
1135           Exit program
1136
1137       quit
1138           Exit program
1139
1140       sign
1141           Force RPC pipe connections to be signed
1142
1143       seal
1144           Force RPC pipe connections to be sealed
1145
1146       packet
1147           Force RPC pipe connections with packet authentication level
1148
1149       schannel
1150           Force RPC pipe connections to be sealed with 'schannel'. Force RPC
1151           pipe connections to be sealed with 'schannel'. Assumes valid
1152           machine account to this domain controller.
1153
1154       schannelsign
1155           Force RPC pipe connections to be signed (not sealed) with
1156           'schannel'. Assumes valid machine account to this domain
1157           controller.
1158
1159       timeout
1160           Set timeout (in milliseconds) for RPC operations
1161
1162       transport
1163           Choose ncacn transport for RPC operations
1164
1165       none
1166           Force RPC pipe connections to have no special properties
1167

BUGS

1169       rpcclient is designed as a developer testing tool and may not be robust
1170       in certain areas (such as command line parsing). It has been known to
1171       generate a core dump upon failures when invalid parameters where passed
1172       to the interpreter.
1173
1174       From Luke Leighton's original rpcclient man page:
1175
1176       WARNING!  The MSRPC over SMB code has been developed from examining
1177       Network traces. No documentation is available from the original
1178       creators (Microsoft) on how MSRPC over SMB works, or how the individual
1179       MSRPC services work. Microsoft's implementation of these services has
1180       been demonstrated (and reported) to be... a bit flaky in places.
1181
1182       The development of Samba's implementation is also a bit rough, and as
1183       more of the services are understood, it can even result in versions of
1184       smbd(8) and rpcclient(1) that are incompatible for some commands or
1185       services. Additionally, the developers are sending reports to
1186       Microsoft, and problems found or reported to Microsoft are fixed in
1187       Service Packs, which may result in incompatibilities.
1188

VERSION

1190       This man page is part of version 4.16.2 of the Samba suite.
1191

AUTHOR

1193       The original Samba software and related utilities were created by
1194       Andrew Tridgell. Samba is now developed by the Samba Team as an Open
1195       Source project similar to the way the Linux kernel is developed.
1196
1197       The original rpcclient man page was written by Matthew Geddes, Luke
1198       Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion
1199       to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to
1200       DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.
1201
1202
1203
1204Samba 4.16.2                      06/13/2022                      RPCCLIENT(1)
Impressum