1RPCCLIENT(1) User Commands RPCCLIENT(1)
2
3
4
6 rpcclient - tool for executing client side MS-RPC functions
7
9 rpcclient [-c|--command=COMMANDS] [-I|--dest-ip=IP] [-p|--port=PORT]
10 [-?|--help] [--usage] [-d|--debuglevel=DEBUGLEVEL] [--debug-stdout]
11 [--configfile=CONFIGFILE] [--option=name=value]
12 [-l|--log-basename=LOGFILEBASE] [--leak-report] [--leak-report-full]
13 [-R|--name-resolve=NAME-RESOLVE-ORDER]
14 [-O|--socket-options=SOCKETOPTIONS] [-m|--max-protocol=MAXPROTOCOL]
15 [-n|--netbiosname=NETBIOSNAME] [--netbios-scope=SCOPE]
16 [-W|--workgroup=WORKGROUP] [--realm=REALM]
17 [-U|--user=[DOMAIN/]USERNAME[%PASSWORD]] [-N|--no-pass]
18 [--password=STRING] [--pw-nt-hash] [-A|--authentication-file=FILE]
19 [-P|--machine-pass] [--simple-bind-dn=DN]
20 [--use-kerberos=desired|required|off] [--use-krb5-ccache=CCACHE]
21 [--use-winbind-ccache] [--client-protection=sign|encrypt|off]
22 [-V|--version] {BINDING-STRING|HOST}
23
25 This tool is part of the samba(7) suite.
26
27 rpcclient is a utility initially developed to test MS-RPC functionality
28 in Samba itself. It has undergone several stages of development and
29 stability. Many system administrators have now written scripts around
30 it to manage Windows NT clients from their UNIX workstation.
31
33 BINDING-STRING|HOST
34 When connecting to a dcerpc service you need to specify a binding
35 string.
36
37 The format is:
38
39 TRANSPORT:host[options]
40
41 where TRANSPORT is either ncacn_np (named pipes) for SMB or
42 ncacn_ip_tcp for DCERPC over TCP/IP.
43
44 "host" is an IP or hostname or netbios name. If the binding string
45 identifies the server side of an endpoint, "host" may be an empty
46 string. See below for more details.
47
48 "options" can include a SMB pipe name if using the ncacn_np
49 transport or a TCP port number if using the ncacn_ip_tcp transport,
50 otherwise they will be auto-determined.
51
52 Examples:
53
54 • ncacn_ip_tcp:samba.example.com[1024]
55
56 • ncacn_ip_tcp:samba.example.com[sign,seal,krb5]
57
58 • ncacn_ip_tcp:samba.example.com[sign,spnego]
59
60 • ncacn_np:samba.example.com
61
62 • ncacn_np:samba.example.com[samr]
63
64 • ncacn_np:samba.example.com[samr,sign,print]
65
66 • ncalrpc:/path/to/unix/socket
67
68 • //SAMBA
69
70 The supported transports are:
71
72 • ncacn_np - Connect using named pipes
73
74 • ncacn_ip_tcp - Connect over TCP/IP
75
76 • ncalrpc - Connect over local RPC (unix sockets)
77
78 The supported options are:
79
80 • sign - Use RPC integrity authentication level
81
82 • seal - Enable RPC privacy (encryption) authentication
83 level
84
85 • connect - Use RPC connect level authentication (auth,
86 but no sign or seal)
87
88 • packet - Use RPC packet authentication level
89
90 • spnego - Use SPNEGO instead of NTLMSSP authentication
91
92 • ntlm - Use plain NTLM instead of SPNEGO or NTLMSSP
93
94 • krb5 - Use Kerberos instead of NTLMSSP authentication
95
96 • schannel - Create a schannel connection
97
98 • smb1 - Use SMB1 for named pipes
99
100 • smb2 - Use SMB2/3 for named pipes
101
102 • validate - Enable the NDR validator
103
104 • print - Enable debug output of packets
105
106 • padcheck - Check reply data for non-zero pad bytes
107
108 • bigendian - Use big endian for RPC
109
110 • ndr64 - Use NDR64 for RPC
111
112
113 -c|--command=<command string>
114 Execute semicolon separated commands (listed below)
115
116 -I|--dest-ip IP-address
117 IP address is the address of the server to connect to. It should be
118 specified in standard "a.b.c.d" notation.
119
120 Normally the client would attempt to locate a named SMB/CIFS server
121 by looking it up via the NetBIOS name resolution mechanism
122 described above in the name resolve order parameter above. Using
123 this parameter will force the client to assume that the server is
124 on the machine with the specified IP address and the NetBIOS name
125 component of the resource being connected to will be ignored.
126
127 There is no default for this parameter. If not supplied, it will be
128 determined automatically by the client as described above.
129
130 -p|--port port
131 This number is the TCP port number that will be used when making
132 connections to the server. The standard (well-known) TCP port
133 number for an SMB/CIFS server is 139, which is the default.
134
135 -?|--help
136 Print a summary of command line options.
137
138 --usage
139 Display brief usage message.
140
141 -d|--debuglevel=DEBUGLEVEL
142 level is an integer from 0 to 10. The default value if this
143 parameter is not specified is 1 for client applications.
144
145 The higher this value, the more detail will be logged to the log
146 files about the activities of the server. At level 0, only critical
147 errors and serious warnings will be logged. Level 1 is a reasonable
148 level for day-to-day running - it generates a small amount of
149 information about operations carried out.
150
151 Levels above 1 will generate considerable amounts of log data, and
152 should only be used when investigating a problem. Levels above 3
153 are designed for use only by developers and generate HUGE amounts
154 of log data, most of which is extremely cryptic.
155
156 Note that specifying this parameter here will override the log
157 level parameter in the smb.conf file.
158
159 --debug-stdout
160 This will redirect debug output to STDOUT. By default all clients
161 are logging to STDERR.
162
163 --configfile=<configuration file>
164 The file specified contains the configuration details required by
165 the client. The information in this file can be general for client
166 and server or only provide client specific like options such as
167 client smb encrypt. See smb.conf for more information. The default
168 configuration file name is determined at compile time.
169
170 --option=<name>=<value>
171 Set the smb.conf(5) option "<name>" to value "<value>" from the
172 command line. This overrides compiled-in defaults and options read
173 from the configuration file. If a name or a value includes a space,
174 wrap whole --option=name=value into quotes.
175
176 -l|--log-basename=logdirectory
177 Base directory name for log/debug files. The extension ".progname"
178 will be appended (e.g. log.smbclient, log.smbd, etc...). The log
179 file is never removed by the client.
180
181 --leak-report
182 Enable talloc leak reporting on exit.
183
184 --leak-report-full
185 Enable full talloc leak reporting on exit.
186
187 -V|--version
188 Prints the program version number.
189
190 -R|--name-resolve=NAME-RESOLVE-ORDER
191 This option is used to determine what naming services and in what
192 order to resolve host names to IP addresses. The option takes a
193 space-separated string of different name resolution options. The
194 best ist to wrap the whole --name-resolve=NAME-RESOLVE-ORDER into
195 quotes.
196
197 The options are: "lmhosts", "host", "wins" and "bcast". They cause
198 names to be resolved as follows:
199
200 • lmhosts: Lookup an IP address in the Samba lmhosts file.
201 If the line in lmhosts has no name type attached to the
202 NetBIOS name (see the lmhosts(5) for details) then any
203 name type matches for lookup.
204
205 • host: Do a standard host name to IP address resolution,
206 using the system /etc/hosts, NIS, or DNS lookups. This
207 method of name resolution is operating system dependent,
208 for instance on IRIX or Solaris this may be controlled
209 by the /etc/nsswitch.conf file). Note that this method
210 is only used if the NetBIOS name type being queried is
211 the 0x20 (server) name type, otherwise it is ignored.
212
213 • wins: Query a name with the IP address listed in the
214 wins server parameter. If no WINS server has been
215 specified this method will be ignored.
216
217 • bcast: Do a broadcast on each of the known local
218 interfaces listed in the interfaces parameter. This is
219 the least reliable of the name resolution methods as it
220 depends on the target host being on a locally connected
221 subnet.
222
223 If this parameter is not set then the name resolve order defined in
224 the smb.conf file parameter (name resolve order) will be used.
225
226 The default order is lmhosts, host, wins, bcast. Without this
227 parameter or any entry in the name resolve order parameter of the
228 smb.conf file, the name resolution methods will be attempted in
229 this order.
230
231 -O|--socket-options=SOCKETOPTIONS
232 TCP socket options to set on the client socket. See the socket
233 options parameter in the smb.conf manual page for the list of valid
234 options.
235
236 -m|--max-protocol=MAXPROTOCOL
237 The value of the parameter (a string) is the highest protocol level
238 that will be supported by the client.
239
240 Note that specifying this parameter here will override the client
241 max protocol parameter in the smb.conf file.
242
243 -n|--netbiosname=NETBIOSNAME
244 This option allows you to override the NetBIOS name that Samba uses
245 for itself. This is identical to setting the netbios name parameter
246 in the smb.conf file. However, a command line setting will take
247 precedence over settings in smb.conf.
248
249 --netbios-scope=SCOPE
250 This specifies a NetBIOS scope that nmblookup will use to
251 communicate with when generating NetBIOS names. For details on the
252 use of NetBIOS scopes, see rfc1001.txt and rfc1002.txt. NetBIOS
253 scopes are very rarely used, only set this parameter if you are the
254 system administrator in charge of all the NetBIOS systems you
255 communicate with.
256
257 -W|--workgroup=WORKGROUP
258 Set the SMB domain of the username. This overrides the default
259 domain which is the domain defined in smb.conf. If the domain
260 specified is the same as the servers NetBIOS name, it causes the
261 client to log on using the servers local SAM (as opposed to the
262 Domain SAM).
263
264 Note that specifying this parameter here will override the
265 workgroup parameter in the smb.conf file.
266
267 -r|--realm=REALM
268 Set the realm for the domain.
269
270 Note that specifying this parameter here will override the realm
271 parameter in the smb.conf file.
272
273 -U|--user=[DOMAIN\]USERNAME[%PASSWORD]
274 Sets the SMB username or username and password.
275
276 If %PASSWORD is not specified, the user will be prompted. The
277 client will first check the USER environment variable (which is
278 also permitted to also contain the password seperated by a %), then
279 the LOGNAME variable (which is not permitted to contain a password)
280 and if either exists, the value is used. If these environmental
281 variables are not found, the username found in a Kerberos
282 Credentials cache may be used.
283
284 A third option is to use a credentials file which contains the
285 plaintext of the username and password. This option is mainly
286 provided for scripts where the admin does not wish to pass the
287 credentials on the command line or via environment variables. If
288 this method is used, make certain that the permissions on the file
289 restrict access from unwanted users. See the -A for more details.
290
291 Be cautious about including passwords in scripts or passing
292 user-supplied values onto the command line. For security it is
293 better to let the Samba client tool ask for the password if needed,
294 or obtain the password once with kinit.
295
296 While Samba will attempt to scrub the password from the process
297 title (as seen in ps), this is after startup and so is subject to a
298 race.
299
300 -N|--no-pass
301 If specified, this parameter suppresses the normal password prompt
302 from the client to the user. This is useful when accessing a
303 service that does not require a password.
304
305 Unless a password is specified on the command line or this
306 parameter is specified, the client will request a password.
307
308 If a password is specified on the command line and this option is
309 also defined the password on the command line will be silently
310 ignored and no password will be used.
311
312 --password
313 Specify the password on the commandline.
314
315 Be cautious about including passwords in scripts or passing
316 user-supplied values onto the command line. For security it is
317 better to let the Samba client tool ask for the password if needed,
318 or obtain the password once with kinit.
319
320 If --password is not specified, the tool will check the PASSWD
321 environment variable, followed by PASSWD_FD which is expected to
322 contain an open file descriptor (FD) number.
323
324 Finally it will check PASSWD_FILE (containing a file path to be
325 opened). The file should only contain the password. Make certain
326 that the permissions on the file restrict access from unwanted
327 users!
328
329 While Samba will attempt to scrub the password from the process
330 title (as seen in ps), this is after startup and so is subject to a
331 race.
332
333 --pw-nt-hash
334 The supplied password is the NT hash.
335
336 -A|--authentication-file=filename
337 This option allows you to specify a file from which to read the
338 username and password used in the connection. The format of the
339 file is:
340
341 username = <value>
342 password = <value>
343 domain = <value>
344
345
346 Make certain that the permissions on the file restrict access from
347 unwanted users!
348
349 -P|--machine-pass
350 Use stored machine account password.
351
352 --simple-bind-dn=DN
353 DN to use for a simple bind.
354
355 --use-kerberos=desired|required|off
356 This parameter determines whether Samba client tools will try to
357 authenticate using Kerberos. For Kerberos authentication you need
358 to use dns names instead of IP addresses when connnecting to a
359 service.
360
361 Note that specifying this parameter here will override the client
362 use kerberos parameter in the smb.conf file.
363
364 --use-krb5-ccache=CCACHE
365 Specifies the credential cache location for Kerberos
366 authentication.
367
368 This will set --use-kerberos=required too.
369
370 --use-winbind-ccache
371 Try to use the credential cache by winbind.
372
373 --client-protection=sign|encrypt|off
374 Sets the connection protection the client tool should use.
375
376 Note that specifying this parameter here will override the client
377 protection parameter in the smb.conf file.
378
379 In case you need more fine grained control you can use:
380 --option=clientsmbencrypt=OPTION, --option=clientipcsigning=OPTION,
381 --option=clientsigning=OPTION.
382
384 LSARPC
385 lsaquery
386 Query info policy
387
388 lookupsids
389 Convert SIDs to names
390
391 lookupsids3
392 Convert SIDs to names
393
394 lookupsids_level
395 Convert SIDs to names
396
397 lookupnames
398 Convert names to SIDs
399
400 lookupnames4
401 Convert names to SIDs
402
403 lookupnames_level
404 Convert names to SIDs
405
406 enumtrust
407 Enumerate trusted domains
408
409 enumprivs
410 Enumerate privileges
411
412 getdispname
413 Get the privilege name
414
415 lsaenumsid
416 Enumerate the LSA SIDS
417
418 lsacreateaccount
419 Create a new lsa account
420
421 lsaenumprivsaccount
422 Enumerate the privileges of an SID
423
424 lsaenumacctrights
425 Enumerate the rights of an SID
426
427 lsaaddpriv
428 Assign a privilege to a SID
429
430 lsadelpriv
431 Revoke a privilege from a SID
432
433 lsaaddacctrights
434 Add rights to an account
435
436 lsaremoveacctrights
437 Remove rights from an account
438
439 lsalookupprivvalue
440 Get a privilege value given its name
441
442 lsaquerysecobj
443 Query LSA security object
444
445 lsaquerytrustdominfo
446 Query LSA trusted domains info (given a SID)
447
448 lsaquerytrustdominfobyname
449 Query LSA trusted domains info (given a name), only works for
450 Windows > 2k
451
452 lsaquerytrustdominfobysid
453 Query LSA trusted domains info (given a SID)
454
455 lsasettrustdominfo
456 Set LSA trusted domain info
457
458 getusername
459 Get username
460
461 createsecret
462 Create Secret
463
464 deletesecret
465 Delete Secret
466
467 querysecret
468 Query Secret
469
470 setsecret
471 Set Secret
472
473 retrieveprivatedata
474 Retrieve Private Data
475
476 storeprivatedata
477 Store Private Data
478
479 createtrustdom
480 Create Trusted Domain
481
482 deletetrustdom
483 Delete Trusted Domain
484
485 LSARPC-DS
486 dsroledominfo
487 Get Primary Domain Information
488
489 DFS
490 dfsversion
491 Query DFS support
492
493 dfsadd
494 Add a DFS share
495
496 dfsremove
497 Remove a DFS share
498
499 dfsgetinfo
500 Query DFS share info
501
502 dfsenum
503 Enumerate dfs shares
504
505 dfsenumex
506 Enumerate dfs shares
507
508 SHUTDOWN
509 shutdowninit
510 syntax: shutdown [-m message]
511
512 shutdownabort
513 syntax: shutdownabort
514
515 SRVSVC
516 srvinfo
517 Server query info
518
519 netshareenum
520 Enumerate shares
521
522 netshareenumall
523 Enumerate all shares
524
525 netsharegetinfo
526 Get Share Info
527
528 netsharesetinfo
529 Set Share Info
530
531 netsharesetdfsflags
532 Set DFS flags
533
534 netfileenum
535 Enumerate open files
536
537 netremotetod
538 Fetch remote time of day
539
540 netnamevalidate
541 Validate sharename
542
543 netfilegetsec
544 Get File security
545
546 netsessdel
547 Delete Session
548
549 netsessenum
550 Enumerate Sessions
551
552 netdiskenum
553 Enumerate Disks
554
555 netconnenum
556 Enumerate Connections
557
558 netshareadd
559 Add share
560
561 netsharedel
562 Delete share
563
564 SAMR
565 queryuser
566 Query user info
567
568 querygroup
569 Query group info
570
571 queryusergroups
572 Query user groups
573
574 queryuseraliases
575 Query user aliases
576
577 querygroupmem
578 Query group membership
579
580 queryaliasmem
581 Query alias membership
582
583 queryaliasinfo
584 Query alias info
585
586 deletealias
587 Delete an alias
588
589 querydispinfo
590 Query display info
591
592 querydispinfo2
593 Query display info
594
595 querydispinfo3
596 Query display info
597
598 querydominfo
599 Query domain info
600
601 enumdomusers
602 Enumerate domain users
603
604 enumdomgroups
605 Enumerate domain groups
606
607 enumalsgroups
608 Enumerate alias groups
609
610 enumdomains
611 Enumerate domains
612
613 createdomuser
614 Create domain user
615
616 createdomgroup
617 Create domain group
618
619 createdomalias
620 Create domain alias
621
622 samlookupnames
623 Look up names
624
625 samlookuprids
626 Look up names
627
628 deletedomgroup
629 Delete domain group
630
631 deletedomuser
632 Delete domain user
633
634 samquerysecobj
635 Query SAMR security object
636
637 getdompwinfo
638 Retrieve domain password info
639
640 getusrdompwinfo
641 Retrieve user domain password info
642
643 lookupdomain
644 Lookup Domain Name
645
646 chgpasswd
647 Change user password
648
649 chgpasswd2
650 Change user password
651
652 chgpasswd3
653 Change user password
654
655 getdispinfoidx
656 Get Display Information Index
657
658 setuserinfo
659 Set user info
660
661 setuserinfo2
662 Set user info2
663
664 SPOOLSS
665 adddriver <arch> <config> [<version>]
666 Execute an AddPrinterDriver() RPC to install the printer driver
667 information on the server. Note that the driver files should
668 already exist in the directory returned by getdriverdir. Possible
669 values for arch are the same as those for the getdriverdir command.
670 The config parameter is defined as follows:
671
672 Long Driver Name:\
673 Driver File Name:\
674 Data File Name:\
675 Config File Name:\
676 Help File Name:\
677 Language Monitor Name:\
678 Default Data Type:\
679 Comma Separated list of Files
680
681 Any empty fields should be enter as the string "NULL".
682
683 Samba does not need to support the concept of Print Monitors since
684 these only apply to local printers whose driver can make use of a
685 bi-directional link for communication. This field should be "NULL".
686 On a remote NT print server, the Print Monitor for a driver must
687 already be installed prior to adding the driver or else the RPC
688 will fail.
689
690 The version parameter lets you specify the printer driver version
691 number. If omitted, the default driver version for the specified
692 architecture will be used. This option can be used to upload
693 Windows 2000 (version 3) printer drivers.
694
695 addprinter <printername> <sharename> <drivername> <port>
696 Add a printer on the remote server. This printer will be
697 automatically shared. Be aware that the printer driver must already
698 be installed on the server (see adddriver) and the portmust be a
699 valid port name (see enumports.
700
701 deldriver <driver>
702 Delete the specified printer driver for all architectures. This
703 does not delete the actual driver files from the server, only the
704 entry from the server's list of drivers.
705
706 deldriverex <driver> [architecture] [version] [flags]
707 Delete the specified printer driver and optionally files associated
708 with the driver. You can limit this action to a specific
709 architecture and a specific version. If no architecture is given,
710 all driver files of that driver will be deleted. flags correspond
711 to numeric DPD_* values, i.e. a value of 3 requests
712 (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION).
713
714 enumdata
715 Enumerate all printer setting data stored on the server. On Windows
716 NT clients, these values are stored in the registry, while Samba
717 servers store them in the printers TDB. This command corresponds to
718 the MS Platform SDK GetPrinterData() function (* This command is
719 currently unimplemented).
720
721 enumdataex
722 Enumerate printer data for a key
723
724 enumkey
725 Enumerate printer keys
726
727 enumjobs <printer>
728 List the jobs and status of a given printer. This command
729 corresponds to the MS Platform SDK EnumJobs() function
730
731 getjob
732 Get print job
733
734 setjob
735 Set print job
736
737 enumports [level]
738 Executes an EnumPorts() call using the specified info level.
739 Currently only info levels 1 and 2 are supported.
740
741 enumdrivers [level]
742 Execute an EnumPrinterDrivers() call. This lists the various
743 installed printer drivers for all architectures. Refer to the MS
744 Platform SDK documentation for more details of the various flags
745 and calling options. Currently supported info levels are 1, 2, and
746 3.
747
748 enumprinters [level]
749 Execute an EnumPrinters() call. This lists the various installed
750 and share printers. Refer to the MS Platform SDK documentation for
751 more details of the various flags and calling options. Currently
752 supported info levels are 1, 2 and 5.
753
754 getdata <printername> <valuename;>
755 Retrieve the data for a given printer setting. See the enumdata
756 command for more information. This command corresponds to the
757 GetPrinterData() MS Platform SDK function.
758
759 getdataex
760 Get printer driver data with keyname
761
762 getdriver <printername>
763 Retrieve the printer driver information (such as driver file,
764 config file, dependent files, etc...) for the given printer. This
765 command corresponds to the GetPrinterDriver() MS Platform SDK
766 function. Currently info level 1, 2, and 3 are supported.
767
768 getdriverdir <arch>
769 Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share
770 name and subdirectory for storing printer driver files for a given
771 architecture. Possible values for arch are "Windows 4.0" (for
772 Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows
773 Alpha_AXP", and "Windows NT R4000".
774
775 getdriverpackagepath
776 Get print driver package download directory
777
778 getprinter <printername>
779 Retrieve the current printer information. This command corresponds
780 to the GetPrinter() MS Platform SDK function.
781
782 openprinter <printername>
783 Execute an OpenPrinterEx() and ClosePrinter() RPC against a given
784 printer.
785
786 openprinter_ex <printername>
787 Open printer handle
788
789 setdriver <printername> <drivername>
790 Execute a SetPrinter() command to update the printer driver
791 associated with an installed printer. The printer driver must
792 already be correctly installed on the print server.
793
794 See also the enumprinters and enumdrivers commands for obtaining a
795 list of of installed printers and drivers.
796
797 getprintprocdir
798 Get print processor directory
799
800 addform
801 Add form
802
803 setform
804 Set form
805
806 getform
807 Get form
808
809 deleteform
810 Delete form
811
812 enumforms
813 Enumerate form
814
815 setprinter
816 Set printer comment
817
818 setprinterdata
819 Set REG_SZ printer data
820
821 setprintername <printername> <newprintername>
822 Set printer name
823
824 rffpcnex
825 Rffpcnex test
826
827 printercmp
828 Printer comparison test
829
830 enumprocs
831 Enumerate Print Processors
832
833 enumprocdatatypes
834 Enumerate Print Processor Data Types
835
836 enummonitors
837 Enumerate Print Monitors
838
839 createprinteric
840 Create Printer IC
841
842 playgdiscriptonprinteric
843 Create Printer IC
844
845 getcoreprinterdrivers
846 Get CorePrinterDriver
847
848 enumpermachineconnections
849 Enumerate Per Machine Connections
850
851 addpermachineconnection
852 Add Per Machine Connection
853
854 delpermachineconnection
855 Delete Per Machine Connection
856
857 NETLOGON
858 logonctrl2
859 Logon Control 2
860
861 getanydcname
862 Get trusted DC name
863
864 getdcname
865 Get trusted PDC name
866
867 dsr_getdcname
868 Get trusted DC name
869
870 dsr_getdcnameex
871 Get trusted DC name
872
873 dsr_getdcnameex2
874 Get trusted DC name
875
876 dsr_getsitename
877 Get sitename
878
879 dsr_getforesttrustinfo
880 Get Forest Trust Info
881
882 logonctrl
883 Logon Control
884
885 samlogon
886 Sam Logon
887
888 change_trust_pw
889 Change Trust Account Password
890
891 gettrustrid
892 Get trust rid
893
894 dsr_enumtrustdom
895 Enumerate trusted domains
896
897 dsenumdomtrusts
898 Enumerate all trusted domains in an AD forest
899
900 deregisterdnsrecords
901 Deregister DNS records
902
903 netrenumtrusteddomains
904 Enumerate trusted domains
905
906 netrenumtrusteddomainsex
907 Enumerate trusted domains
908
909 getdcsitecoverage
910 Get the Site-Coverage from a DC
911
912 capabilities
913 Return Capabilities
914
915 logongetdomaininfo
916 Return LogonGetDomainInfo
917
918 FSRVP
919 fss_is_path_sup
920 Check whether a share supports shadow-copy
921
922 fss_get_sup_version
923 Get supported FSRVP version from server
924
925 fss_create_expose
926 Request shadow-copy creation and exposure
927
928 fss_delete
929 Request shadow-copy share deletion
930
931 fss_has_shadow_copy
932 Check for an associated share shadow-copy
933
934 fss_get_mapping
935 Get shadow-copy share mapping information
936
937 fss_recovery_complete
938 Flag read-write snapshot as recovery complete,
939
940 CLUSAPI
941 clusapi_open_cluster
942 Open cluster
943
944 clusapi_get_cluster_name
945 Get cluster name
946
947 clusapi_get_cluster_version
948 Get cluster version
949
950 clusapi_get_quorum_resource
951 Get quorum resource
952
953 clusapi_create_enum
954 Create enum query
955
956 clusapi_create_enumex
957 Create enumex query
958
959 clusapi_open_resource
960 Open cluster resource
961
962 clusapi_online_resource
963 Set cluster resource online
964
965 clusapi_offline_resource
966 Set cluster resource offline
967
968 clusapi_get_resource_state
969 Get cluster resource state
970
971 clusapi_get_cluster_version2
972 Get cluster version2
973
974 clusapi_pause_node
975 Pause cluster node
976
977 clusapi_resume_node
978 Resume cluster node
979
980 DRSUAPI
981 dscracknames
982 Crack Name
983
984 dsgetdcinfo
985 Get Domain Controller Info
986
987 dsgetncchanges
988 Get NC Changes
989
990 dswriteaccountspn
991 Write Account SPN
992
993 ECHO
994 echoaddone
995 Add one to a number
996
997 echodata
998 Echo data
999
1000 sinkdata
1001 Sink data
1002
1003 sourcedata
1004 Source data
1005
1006 EPMAPPER
1007 epmmap
1008 Map a binding
1009
1010 epmlookup
1011 Lookup bindings
1012
1013 EVENTLOG
1014 eventlog_readlog
1015 Read Eventlog
1016
1017 eventlog_numrecord
1018 Get number of records
1019
1020 eventlog_oldestrecord
1021 Get oldest record
1022
1023 eventlog_reportevent
1024 Report event
1025
1026 eventlog_reporteventsource
1027 Report event and source
1028
1029 eventlog_registerevsource
1030 Register event source
1031
1032 eventlog_backuplog
1033 Backup Eventlog File
1034
1035 eventlog_loginfo
1036 Get Eventlog Information
1037
1038 IRemoteWinspool
1039 winspool_AsyncOpenPrinter
1040 Open printer handle
1041
1042 winspool_AsyncCorePrinterDriverInstalled
1043 Query Core Printer Driver Installed
1044
1045 NTSVCS
1046 ntsvcs_getversion
1047 Query NTSVCS version
1048
1049 ntsvcs_validatedevinst
1050 Query NTSVCS device instance
1051
1052 ntsvcs_hwprofflags
1053 Query NTSVCS HW prof flags
1054
1055 ntsvcs_hwprofinfo
1056 Query NTSVCS HW prof info
1057
1058 ntsvcs_getdevregprop
1059 Query NTSVCS device registry property
1060
1061 ntsvcs_getdevlistsize
1062 Query NTSVCS device list size
1063
1064 ntsvcs_getdevlist
1065 Query NTSVCS device list
1066
1067 MDSSVC
1068 fetch_properties
1069 Fetch connection properties
1070
1071 fetch_attributes
1072 Fetch attributes for a CNID
1073
1074 WINREG
1075 winreg_enumkey
1076 Enumerate Keys
1077
1078 querymultiplevalues
1079 Query multiple values
1080
1081 querymultiplevalues2
1082 Query multiple values
1083
1084 WITNESS
1085 GetInterfaceList
1086 List the interfaces to which witness client connections can be made
1087
1088 Register
1089 Register for resource state change notifications of a NetName and
1090 IPAddress
1091
1092 UnRegister
1093 Unregister for notifications from the server
1094
1095 AsyncNotify
1096 Request notification of registered resource changes from the server
1097
1098 RegisterEx
1099 Register for resource state change notifications of a NetName,
1100 ShareName and multiple IPAddresses
1101
1102 WKSSVC
1103 wkssvc_wkstagetinfo
1104 Query WKSSVC Workstation Information
1105
1106 wkssvc_getjoininformation
1107 Query WKSSVC Join Information
1108
1109 wkssvc_messagebuffersend
1110 Send WKSSVC message
1111
1112 wkssvc_enumeratecomputernames
1113 Enumerate WKSSVC computer names
1114
1115 wkssvc_enumerateusers
1116 Enumerate WKSSVC users
1117
1118 GENERAL OPTIONS
1119 help
1120 Get help on commands
1121
1122 ?
1123 Get help on commands
1124
1125 debuglevel
1126 Set debug level
1127
1128 debug
1129 Set debug level
1130
1131 list
1132 List available commands on pipe
1133
1134 exit
1135 Exit program
1136
1137 quit
1138 Exit program
1139
1140 sign
1141 Force RPC pipe connections to be signed
1142
1143 seal
1144 Force RPC pipe connections to be sealed
1145
1146 packet
1147 Force RPC pipe connections with packet authentication level
1148
1149 schannel
1150 Force RPC pipe connections to be sealed with 'schannel'. Force RPC
1151 pipe connections to be sealed with 'schannel'. Assumes valid
1152 machine account to this domain controller.
1153
1154 schannelsign
1155 Force RPC pipe connections to be signed (not sealed) with
1156 'schannel'. Assumes valid machine account to this domain
1157 controller.
1158
1159 timeout
1160 Set timeout (in milliseconds) for RPC operations
1161
1162 transport
1163 Choose ncacn transport for RPC operations
1164
1165 none
1166 Force RPC pipe connections to have no special properties
1167
1169 rpcclient is designed as a developer testing tool and may not be robust
1170 in certain areas (such as command line parsing). It has been known to
1171 generate a core dump upon failures when invalid parameters where passed
1172 to the interpreter.
1173
1174 From Luke Leighton's original rpcclient man page:
1175
1176 WARNING! The MSRPC over SMB code has been developed from examining
1177 Network traces. No documentation is available from the original
1178 creators (Microsoft) on how MSRPC over SMB works, or how the individual
1179 MSRPC services work. Microsoft's implementation of these services has
1180 been demonstrated (and reported) to be... a bit flaky in places.
1181
1182 The development of Samba's implementation is also a bit rough, and as
1183 more of the services are understood, it can even result in versions of
1184 smbd(8) and rpcclient(1) that are incompatible for some commands or
1185 services. Additionally, the developers are sending reports to
1186 Microsoft, and problems found or reported to Microsoft are fixed in
1187 Service Packs, which may result in incompatibilities.
1188
1190 This man page is part of version 4.16.2 of the Samba suite.
1191
1193 The original Samba software and related utilities were created by
1194 Andrew Tridgell. Samba is now developed by the Samba Team as an Open
1195 Source project similar to the way the Linux kernel is developed.
1196
1197 The original rpcclient man page was written by Matthew Geddes, Luke
1198 Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion
1199 to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to
1200 DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.
1201
1202
1203
1204Samba 4.16.2 06/13/2022 RPCCLIENT(1)