1RPCCLIENT(1) User Commands RPCCLIENT(1)
2
3
4
6 rpcclient - tool for executing client side MS-RPC functions
7
9 rpcclient [-c|--command=COMMANDS] [-I|--dest-ip=IP] [-p|--port=PORT]
10 [-?|--help] [--usage] [-d|--debuglevel=DEBUGLEVEL] [--debug-stdout]
11 [--configfile=CONFIGFILE] [--option=name=value]
12 [-l|--log-basename=LOGFILEBASE] [--leak-report] [--leak-report-full]
13 [-R|--name-resolve=NAME-RESOLVE-ORDER]
14 [-O|--socket-options=SOCKETOPTIONS] [-m|--max-protocol=MAXPROTOCOL]
15 [-n|--netbiosname=NETBIOSNAME] [--netbios-scope=SCOPE]
16 [-W|--workgroup=WORKGROUP] [--realm=REALM]
17 [-U|--user=[DOMAIN/]USERNAME[%PASSWORD]] [-N|--no-pass]
18 [--password=STRING] [--pw-nt-hash] [-A|--authentication-file=FILE]
19 [-P|--machine-pass] [--simple-bind-dn=DN]
20 [--use-kerberos=desired|required|off] [--use-krb5-ccache=CCACHE]
21 [--use-winbind-ccache] [--client-protection=sign|encrypt|off]
22 [-V|--version] {BINDING-STRING|HOST}
23
25 This tool is part of the samba(7) suite.
26
27 rpcclient is a utility initially developed to test MS-RPC functionality
28 in Samba itself. It has undergone several stages of development and
29 stability. Many system administrators have now written scripts around
30 it to manage Windows NT clients from their UNIX workstation.
31
33 BINDING-STRING|HOST
34 When connecting to a dcerpc service you need to specify a binding
35 string.
36
37 The format is:
38
39 TRANSPORT:host[options]
40
41 where TRANSPORT is either ncacn_np (named pipes) for SMB or
42 ncacn_ip_tcp for DCERPC over TCP/IP.
43
44 "host" is an IP or hostname or netbios name. If the binding string
45 identifies the server side of an endpoint, "host" may be an empty
46 string. See below for more details.
47
48 "options" can include a SMB pipe name if using the ncacn_np
49 transport or a TCP port number if using the ncacn_ip_tcp transport,
50 otherwise they will be auto-determined.
51
52 Examples:
53
54 • ncacn_ip_tcp:samba.example.com[1024]
55
56 • ncacn_ip_tcp:samba.example.com[sign,seal,krb5]
57
58 • ncacn_ip_tcp:samba.example.com[sign,spnego]
59
60 • ncacn_np:samba.example.com
61
62 • ncacn_np:samba.example.com[samr]
63
64 • ncacn_np:samba.example.com[samr,sign,print]
65
66 • ncalrpc:/path/to/unix/socket
67
68 • //SAMBA
69
70 The supported transports are:
71
72 • ncacn_np - Connect using named pipes
73
74 • ncacn_ip_tcp - Connect over TCP/IP
75
76 • ncalrpc - Connect over local RPC (unix sockets)
77
78 The supported options are:
79
80 • sign - Use RPC integrity authentication level
81
82 • seal - Enable RPC privacy (encryption) authentication
83 level
84
85 • connect - Use RPC connect level authentication (auth,
86 but no sign or seal)
87
88 • packet - Use RPC packet authentication level
89
90 • spnego - Use SPNEGO instead of NTLMSSP authentication
91
92 • ntlm - Use plain NTLM instead of SPNEGO or NTLMSSP
93
94 • krb5 - Use Kerberos instead of NTLMSSP authentication
95
96 • schannel - Create a schannel connection
97
98 • smb1 - Use SMB1 for named pipes
99
100 • smb2 - Use SMB2/3 for named pipes
101
102 • validate - Enable the NDR validator
103
104 • print - Enable debug output of packets
105
106 • padcheck - Check reply data for non-zero pad bytes
107
108 • bigendian - Use big endian for RPC
109
110 • ndr64 - Use NDR64 for RPC
111
112
113 -c|--command=<command string>
114 Execute semicolon separated commands (listed below)
115
116 -I|--dest-ip IP-address
117 IP address is the address of the server to connect to. It should be
118 specified in standard "a.b.c.d" notation.
119
120 Normally the client would attempt to locate a named SMB/CIFS server
121 by looking it up via the NetBIOS name resolution mechanism
122 described above in the name resolve order parameter above. Using
123 this parameter will force the client to assume that the server is
124 on the machine with the specified IP address and the NetBIOS name
125 component of the resource being connected to will be ignored.
126
127 There is no default for this parameter. If not supplied, it will be
128 determined automatically by the client as described above.
129
130 -p|--port port
131 This number is the TCP port number that will be used when making
132 connections to the server. The standard (well-known) TCP port
133 number for an SMB/CIFS server is 139, which is the default.
134
135 -?|--help
136 Print a summary of command line options.
137
138 --usage
139 Display brief usage message.
140
141 -d|--debuglevel=DEBUGLEVEL
142 level is an integer from 0 to 10. The default value if this
143 parameter is not specified is 1 for client applications.
144
145 The higher this value, the more detail will be logged to the log
146 files about the activities of the server. At level 0, only critical
147 errors and serious warnings will be logged. Level 1 is a reasonable
148 level for day-to-day running - it generates a small amount of
149 information about operations carried out.
150
151 Levels above 1 will generate considerable amounts of log data, and
152 should only be used when investigating a problem. Levels above 3
153 are designed for use only by developers and generate HUGE amounts
154 of log data, most of which is extremely cryptic.
155
156 Note that specifying this parameter here will override the log
157 level parameter in the /etc/samba/smb.conf file.
158
159 --debug-stdout
160 This will redirect debug output to STDOUT. By default all clients
161 are logging to STDERR.
162
163 --configfile=<configuration file>
164 The file specified contains the configuration details required by
165 the client. The information in this file can be general for client
166 and server or only provide client specific like options such as
167 client smb encrypt. See /etc/samba/smb.conf for more information.
168 The default configuration file name is determined at compile time.
169
170 --option=<name>=<value>
171 Set the smb.conf(5) option "<name>" to value "<value>" from the
172 command line. This overrides compiled-in defaults and options read
173 from the configuration file. If a name or a value includes a space,
174 wrap whole --option=name=value into quotes.
175
176 -l|--log-basename=logdirectory
177 Base directory name for log/debug files. The extension ".progname"
178 will be appended (e.g. log.smbclient, log.smbd, etc...). The log
179 file is never removed by the client.
180
181 --leak-report
182 Enable talloc leak reporting on exit.
183
184 --leak-report-full
185 Enable full talloc leak reporting on exit.
186
187 -V|--version
188 Prints the program version number.
189
190 -R|--name-resolve=NAME-RESOLVE-ORDER
191 This option is used to determine what naming services and in what
192 order to resolve host names to IP addresses. The option takes a
193 space-separated string of different name resolution options. The
194 best ist to wrap the whole --name-resolve=NAME-RESOLVE-ORDER into
195 quotes.
196
197 The options are: "lmhosts", "host", "wins" and "bcast". They cause
198 names to be resolved as follows:
199
200 • lmhosts: Lookup an IP address in the Samba lmhosts file.
201 If the line in lmhosts has no name type attached to the
202 NetBIOS name (see the lmhosts(5) for details) then any
203 name type matches for lookup.
204
205 • host: Do a standard host name to IP address resolution,
206 using the system /etc/hosts, NIS, or DNS lookups. This
207 method of name resolution is operating system dependent,
208 for instance on IRIX or Solaris this may be controlled
209 by the /etc/nsswitch.conf file). Note that this method
210 is only used if the NetBIOS name type being queried is
211 the 0x20 (server) name type, otherwise it is ignored.
212
213 • wins: Query a name with the IP address listed in the
214 wins server parameter. If no WINS server has been
215 specified this method will be ignored.
216
217 • bcast: Do a broadcast on each of the known local
218 interfaces listed in the interfaces parameter. This is
219 the least reliable of the name resolution methods as it
220 depends on the target host being on a locally connected
221 subnet.
222
223 If this parameter is not set then the name resolve order defined in
224 the /etc/samba/smb.conf file parameter (name resolve order) will be
225 used.
226
227 The default order is lmhosts, host, wins, bcast. Without this
228 parameter or any entry in the name resolve order parameter of the
229 /etc/samba/smb.conf file, the name resolution methods will be
230 attempted in this order.
231
232 -O|--socket-options=SOCKETOPTIONS
233 TCP socket options to set on the client socket. See the socket
234 options parameter in the /etc/samba/smb.conf manual page for the
235 list of valid options.
236
237 -m|--max-protocol=MAXPROTOCOL
238 The value of the parameter (a string) is the highest protocol level
239 that will be supported by the client.
240
241 Note that specifying this parameter here will override the client
242 max protocol parameter in the /etc/samba/smb.conf file.
243
244 -n|--netbiosname=NETBIOSNAME
245 This option allows you to override the NetBIOS name that Samba uses
246 for itself. This is identical to setting the netbios name parameter
247 in the /etc/samba/smb.conf file. However, a command line setting
248 will take precedence over settings in /etc/samba/smb.conf.
249
250 --netbios-scope=SCOPE
251 This specifies a NetBIOS scope that nmblookup will use to
252 communicate with when generating NetBIOS names. For details on the
253 use of NetBIOS scopes, see rfc1001.txt and rfc1002.txt. NetBIOS
254 scopes are very rarely used, only set this parameter if you are the
255 system administrator in charge of all the NetBIOS systems you
256 communicate with.
257
258 -W|--workgroup=WORKGROUP
259 Set the SMB domain of the username. This overrides the default
260 domain which is the domain defined in smb.conf. If the domain
261 specified is the same as the servers NetBIOS name, it causes the
262 client to log on using the servers local SAM (as opposed to the
263 Domain SAM).
264
265 Note that specifying this parameter here will override the
266 workgroup parameter in the /etc/samba/smb.conf file.
267
268 -r|--realm=REALM
269 Set the realm for the domain.
270
271 Note that specifying this parameter here will override the realm
272 parameter in the /etc/samba/smb.conf file.
273
274 -U|--user=[DOMAIN\]USERNAME[%PASSWORD]
275 Sets the SMB username or username and password.
276
277 If %PASSWORD is not specified, the user will be prompted. The
278 client will first check the USER environment variable (which is
279 also permitted to also contain the password separated by a %), then
280 the LOGNAME variable (which is not permitted to contain a password)
281 and if either exists, the value is used. If these environmental
282 variables are not found, the username found in a Kerberos
283 Credentials cache may be used.
284
285 A third option is to use a credentials file which contains the
286 plaintext of the username and password. This option is mainly
287 provided for scripts where the admin does not wish to pass the
288 credentials on the command line or via environment variables. If
289 this method is used, make certain that the permissions on the file
290 restrict access from unwanted users. See the -A for more details.
291
292 Be cautious about including passwords in scripts or passing
293 user-supplied values onto the command line. For security it is
294 better to let the Samba client tool ask for the password if needed,
295 or obtain the password once with kinit.
296
297 While Samba will attempt to scrub the password from the process
298 title (as seen in ps), this is after startup and so is subject to a
299 race.
300
301 -N|--no-pass
302 If specified, this parameter suppresses the normal password prompt
303 from the client to the user. This is useful when accessing a
304 service that does not require a password.
305
306 Unless a password is specified on the command line or this
307 parameter is specified, the client will request a password.
308
309 If a password is specified on the command line and this option is
310 also defined the password on the command line will be silently
311 ignored and no password will be used.
312
313 --password
314 Specify the password on the commandline.
315
316 Be cautious about including passwords in scripts or passing
317 user-supplied values onto the command line. For security it is
318 better to let the Samba client tool ask for the password if needed,
319 or obtain the password once with kinit.
320
321 If --password is not specified, the tool will check the PASSWD
322 environment variable, followed by PASSWD_FD which is expected to
323 contain an open file descriptor (FD) number.
324
325 Finally it will check PASSWD_FILE (containing a file path to be
326 opened). The file should only contain the password. Make certain
327 that the permissions on the file restrict access from unwanted
328 users!
329
330 While Samba will attempt to scrub the password from the process
331 title (as seen in ps), this is after startup and so is subject to a
332 race.
333
334 --pw-nt-hash
335 The supplied password is the NT hash.
336
337 -A|--authentication-file=filename
338 This option allows you to specify a file from which to read the
339 username and password used in the connection. The format of the
340 file is:
341
342 username = <value>
343 password = <value>
344 domain = <value>
345
346
347 Make certain that the permissions on the file restrict access from
348 unwanted users!
349
350 -P|--machine-pass
351 Use stored machine account password.
352
353 --simple-bind-dn=DN
354 DN to use for a simple bind.
355
356 --use-kerberos=desired|required|off
357 This parameter determines whether Samba client tools will try to
358 authenticate using Kerberos. For Kerberos authentication you need
359 to use dns names instead of IP addresses when connecting to a
360 service.
361
362 Note that specifying this parameter here will override the client
363 use kerberos parameter in the /etc/samba/smb.conf file.
364
365 --use-krb5-ccache=CCACHE
366 Specifies the credential cache location for Kerberos
367 authentication.
368
369 This will set --use-kerberos=required too.
370
371 --use-winbind-ccache
372 Try to use the credential cache by winbind.
373
374 --client-protection=sign|encrypt|off
375 Sets the connection protection the client tool should use.
376
377 Note that specifying this parameter here will override the client
378 protection parameter in the /etc/samba/smb.conf file.
379
380 In case you need more fine grained control you can use:
381 --option=clientsmbencrypt=OPTION, --option=clientipcsigning=OPTION,
382 --option=clientsigning=OPTION.
383
385 LSARPC
386 lsaquery
387 Query info policy
388
389 lookupsids
390 Convert SIDs to names
391
392 lookupsids3
393 Convert SIDs to names
394
395 lookupsids_level
396 Convert SIDs to names
397
398 lookupnames
399 Convert names to SIDs
400
401 lookupnames4
402 Convert names to SIDs
403
404 lookupnames_level
405 Convert names to SIDs
406
407 enumtrust
408 Enumerate trusted domains
409
410 enumprivs
411 Enumerate privileges
412
413 getdispname
414 Get the privilege name
415
416 lsaenumsid
417 Enumerate the LSA SIDS
418
419 lsacreateaccount
420 Create a new lsa account
421
422 lsaenumprivsaccount
423 Enumerate the privileges of an SID
424
425 lsaenumacctrights
426 Enumerate the rights of an SID
427
428 lsaaddpriv
429 Assign a privilege to a SID
430
431 lsadelpriv
432 Revoke a privilege from a SID
433
434 lsaaddacctrights
435 Add rights to an account
436
437 lsaremoveacctrights
438 Remove rights from an account
439
440 lsalookupprivvalue
441 Get a privilege value given its name
442
443 lsaquerysecobj
444 Query LSA security object
445
446 lsaquerytrustdominfo
447 Query LSA trusted domains info (given a SID)
448
449 lsaquerytrustdominfobyname
450 Query LSA trusted domains info (given a name), only works for
451 Windows > 2k
452
453 lsaquerytrustdominfobysid
454 Query LSA trusted domains info (given a SID)
455
456 lsasettrustdominfo
457 Set LSA trusted domain info
458
459 getusername
460 Get username
461
462 createsecret
463 Create Secret
464
465 deletesecret
466 Delete Secret
467
468 querysecret
469 Query Secret
470
471 setsecret
472 Set Secret
473
474 retrieveprivatedata
475 Retrieve Private Data
476
477 storeprivatedata
478 Store Private Data
479
480 createtrustdom
481 Create Trusted Domain
482
483 deletetrustdom
484 Delete Trusted Domain
485
486 LSARPC-DS
487 dsroledominfo
488 Get Primary Domain Information
489
490 DFS
491 dfsversion
492 Query DFS support
493
494 dfsadd
495 Add a DFS share
496
497 dfsremove
498 Remove a DFS share
499
500 dfsgetinfo
501 Query DFS share info
502
503 dfsenum
504 Enumerate dfs shares
505
506 dfsenumex
507 Enumerate dfs shares
508
509 SHUTDOWN
510 shutdowninit
511 syntax: shutdown [-m message]
512
513 shutdownabort
514 syntax: shutdownabort
515
516 SRVSVC
517 srvinfo
518 Server query info
519
520 netshareenum
521 Enumerate shares
522
523 netshareenumall
524 Enumerate all shares
525
526 netsharegetinfo
527 Get Share Info
528
529 netsharesetinfo
530 Set Share Info
531
532 netsharesetdfsflags
533 Set DFS flags
534
535 netfileenum
536 Enumerate open files
537
538 netremotetod
539 Fetch remote time of day
540
541 netnamevalidate
542 Validate sharename
543
544 netfilegetsec
545 Get File security
546
547 netsessdel
548 Delete Session
549
550 netsessenum
551 Enumerate Sessions
552
553 netdiskenum
554 Enumerate Disks
555
556 netconnenum
557 Enumerate Connections
558
559 netshareadd
560 Add share
561
562 netsharedel
563 Delete share
564
565 SAMR
566 queryuser
567 Query user info
568
569 querygroup
570 Query group info
571
572 queryusergroups
573 Query user groups
574
575 queryuseraliases
576 Query user aliases
577
578 querygroupmem
579 Query group membership
580
581 queryaliasmem
582 Query alias membership
583
584 queryaliasinfo
585 Query alias info
586
587 deletealias
588 Delete an alias
589
590 querydispinfo
591 Query display info
592
593 querydispinfo2
594 Query display info
595
596 querydispinfo3
597 Query display info
598
599 querydominfo
600 Query domain info
601
602 enumdomusers
603 Enumerate domain users
604
605 enumdomgroups
606 Enumerate domain groups
607
608 enumalsgroups
609 Enumerate alias groups
610
611 enumdomains
612 Enumerate domains
613
614 createdomuser
615 Create domain user
616
617 createdomgroup
618 Create domain group
619
620 createdomalias
621 Create domain alias
622
623 samlookupnames
624 Look up names
625
626 samlookuprids
627 Look up names
628
629 deletedomgroup
630 Delete domain group
631
632 deletedomuser
633 Delete domain user
634
635 samquerysecobj
636 Query SAMR security object
637
638 getdompwinfo
639 Retrieve domain password info
640
641 getusrdompwinfo
642 Retrieve user domain password info
643
644 lookupdomain
645 Lookup Domain Name
646
647 chgpasswd
648 Change user password
649
650 chgpasswd2
651 Change user password
652
653 chgpasswd3
654 Change user password (RC4 encrypted)
655
656 chgpasswd4
657 Change user password (AES encrypted)
658
659 getdispinfoidx
660 Get Display Information Index
661
662 setuserinfo
663 Set user info
664
665 setuserinfo2
666 Set user info2
667
668 SPOOLSS
669 adddriver <arch> <config> [<version>]
670 Execute an AddPrinterDriver() RPC to install the printer driver
671 information on the server. Note that the driver files should
672 already exist in the directory returned by getdriverdir. Possible
673 values for arch are the same as those for the getdriverdir command.
674 The config parameter is defined as follows:
675
676 Long Driver Name:\
677 Driver File Name:\
678 Data File Name:\
679 Config File Name:\
680 Help File Name:\
681 Language Monitor Name:\
682 Default Data Type:\
683 Comma Separated list of Files
684
685 Any empty fields should be enter as the string "NULL".
686
687 Samba does not need to support the concept of Print Monitors since
688 these only apply to local printers whose driver can make use of a
689 bi-directional link for communication. This field should be "NULL".
690 On a remote NT print server, the Print Monitor for a driver must
691 already be installed prior to adding the driver or else the RPC
692 will fail.
693
694 The version parameter lets you specify the printer driver version
695 number. If omitted, the default driver version for the specified
696 architecture will be used. This option can be used to upload
697 Windows 2000 (version 3) printer drivers.
698
699 addprinter <printername> <sharename> <drivername> <port>
700 Add a printer on the remote server. This printer will be
701 automatically shared. Be aware that the printer driver must already
702 be installed on the server (see adddriver) and the portmust be a
703 valid port name (see enumports.
704
705 deldriver <driver>
706 Delete the specified printer driver for all architectures. This
707 does not delete the actual driver files from the server, only the
708 entry from the server's list of drivers.
709
710 deldriverex <driver> [architecture] [version] [flags]
711 Delete the specified printer driver and optionally files associated
712 with the driver. You can limit this action to a specific
713 architecture and a specific version. If no architecture is given,
714 all driver files of that driver will be deleted. flags correspond
715 to numeric DPD_* values, i.e. a value of 3 requests
716 (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION).
717
718 enumdata
719 Enumerate all printer setting data stored on the server. On Windows
720 NT clients, these values are stored in the registry, while Samba
721 servers store them in the printers TDB. This command corresponds to
722 the MS Platform SDK GetPrinterData() function (* This command is
723 currently unimplemented).
724
725 enumdataex
726 Enumerate printer data for a key
727
728 enumkey
729 Enumerate printer keys
730
731 enumjobs <printer>
732 List the jobs and status of a given printer. This command
733 corresponds to the MS Platform SDK EnumJobs() function
734
735 getjob
736 Get print job
737
738 setjob
739 Set print job
740
741 enumports [level]
742 Executes an EnumPorts() call using the specified info level.
743 Currently only info levels 1 and 2 are supported.
744
745 enumdrivers [level]
746 Execute an EnumPrinterDrivers() call. This lists the various
747 installed printer drivers for all architectures. Refer to the MS
748 Platform SDK documentation for more details of the various flags
749 and calling options. Currently supported info levels are 1, 2, and
750 3.
751
752 enumprinters [level]
753 Execute an EnumPrinters() call. This lists the various installed
754 and share printers. Refer to the MS Platform SDK documentation for
755 more details of the various flags and calling options. Currently
756 supported info levels are 1, 2 and 5.
757
758 getdata <printername> <valuename;>
759 Retrieve the data for a given printer setting. See the enumdata
760 command for more information. This command corresponds to the
761 GetPrinterData() MS Platform SDK function.
762
763 getdataex
764 Get printer driver data with keyname
765
766 getdriver <printername>
767 Retrieve the printer driver information (such as driver file,
768 config file, dependent files, etc...) for the given printer. This
769 command corresponds to the GetPrinterDriver() MS Platform SDK
770 function. Currently info level 1, 2, and 3 are supported.
771
772 getdriverdir <arch>
773 Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share
774 name and subdirectory for storing printer driver files for a given
775 architecture. Possible values for arch are "Windows 4.0" (for
776 Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows
777 Alpha_AXP", and "Windows NT R4000".
778
779 getdriverpackagepath
780 Get print driver package download directory
781
782 getprinter <printername>
783 Retrieve the current printer information. This command corresponds
784 to the GetPrinter() MS Platform SDK function.
785
786 openprinter <printername>
787 Execute an OpenPrinterEx() and ClosePrinter() RPC against a given
788 printer.
789
790 openprinter_ex <printername>
791 Open printer handle
792
793 setdriver <printername> <drivername>
794 Execute a SetPrinter() command to update the printer driver
795 associated with an installed printer. The printer driver must
796 already be correctly installed on the print server.
797
798 See also the enumprinters and enumdrivers commands for obtaining a
799 list of of installed printers and drivers.
800
801 getprintprocdir
802 Get print processor directory
803
804 addform
805 Add form
806
807 setform
808 Set form
809
810 getform
811 Get form
812
813 deleteform
814 Delete form
815
816 enumforms
817 Enumerate form
818
819 setprinter
820 Set printer comment
821
822 setprinterdata
823 Set REG_SZ printer data
824
825 setprintername <printername> <newprintername>
826 Set printer name
827
828 rffpcnex
829 Rffpcnex test
830
831 printercmp
832 Printer comparison test
833
834 enumprocs
835 Enumerate Print Processors
836
837 enumprocdatatypes
838 Enumerate Print Processor Data Types
839
840 enummonitors
841 Enumerate Print Monitors
842
843 createprinteric
844 Create Printer IC
845
846 playgdiscriptonprinteric
847 Create Printer IC
848
849 getcoreprinterdrivers
850 Get CorePrinterDriver
851
852 enumpermachineconnections
853 Enumerate Per Machine Connections
854
855 addpermachineconnection
856 Add Per Machine Connection
857
858 delpermachineconnection
859 Delete Per Machine Connection
860
861 NETLOGON
862 logonctrl2
863 Logon Control 2
864
865 getanydcname
866 Get trusted DC name
867
868 getdcname
869 Get trusted PDC name
870
871 dsr_getdcname
872 Get trusted DC name
873
874 dsr_getdcnameex
875 Get trusted DC name
876
877 dsr_getdcnameex2
878 Get trusted DC name
879
880 dsr_getsitename
881 Get sitename
882
883 dsr_getforesttrustinfo
884 Get Forest Trust Info
885
886 logonctrl
887 Logon Control
888
889 samlogon
890 Sam Logon
891
892 change_trust_pw
893 Change Trust Account Password
894
895 gettrustrid
896 Get trust rid
897
898 dsr_enumtrustdom
899 Enumerate trusted domains
900
901 dsenumdomtrusts
902 Enumerate all trusted domains in an AD forest
903
904 deregisterdnsrecords
905 Deregister DNS records
906
907 netrenumtrusteddomains
908 Enumerate trusted domains
909
910 netrenumtrusteddomainsex
911 Enumerate trusted domains
912
913 getdcsitecoverage
914 Get the Site-Coverage from a DC
915
916 capabilities
917 Return Capabilities
918
919 logongetdomaininfo
920 Return LogonGetDomainInfo
921
922 FSRVP
923 fss_is_path_sup
924 Check whether a share supports shadow-copy
925
926 fss_get_sup_version
927 Get supported FSRVP version from server
928
929 fss_create_expose
930 Request shadow-copy creation and exposure
931
932 fss_delete
933 Request shadow-copy share deletion
934
935 fss_has_shadow_copy
936 Check for an associated share shadow-copy
937
938 fss_get_mapping
939 Get shadow-copy share mapping information
940
941 fss_recovery_complete
942 Flag read-write snapshot as recovery complete,
943
944 CLUSAPI
945 clusapi_open_cluster
946 Open cluster
947
948 clusapi_get_cluster_name
949 Get cluster name
950
951 clusapi_get_cluster_version
952 Get cluster version
953
954 clusapi_get_quorum_resource
955 Get quorum resource
956
957 clusapi_create_enum
958 Create enum query
959
960 clusapi_create_enumex
961 Create enumex query
962
963 clusapi_open_resource
964 Open cluster resource
965
966 clusapi_online_resource
967 Set cluster resource online
968
969 clusapi_offline_resource
970 Set cluster resource offline
971
972 clusapi_get_resource_state
973 Get cluster resource state
974
975 clusapi_get_cluster_version2
976 Get cluster version2
977
978 clusapi_pause_node
979 Pause cluster node
980
981 clusapi_resume_node
982 Resume cluster node
983
984 DRSUAPI
985 dscracknames
986 Crack Name
987
988 dsgetdcinfo
989 Get Domain Controller Info
990
991 dsgetncchanges
992 Get NC Changes
993
994 dswriteaccountspn
995 Write Account SPN
996
997 ECHO
998 echoaddone
999 Add one to a number
1000
1001 echodata
1002 Echo data
1003
1004 sinkdata
1005 Sink data
1006
1007 sourcedata
1008 Source data
1009
1010 EPMAPPER
1011 epmmap
1012 Map a binding
1013
1014 epmlookup
1015 Lookup bindings
1016
1017 EVENTLOG
1018 eventlog_readlog
1019 Read Eventlog
1020
1021 eventlog_numrecord
1022 Get number of records
1023
1024 eventlog_oldestrecord
1025 Get oldest record
1026
1027 eventlog_reportevent
1028 Report event
1029
1030 eventlog_reporteventsource
1031 Report event and source
1032
1033 eventlog_registerevsource
1034 Register event source
1035
1036 eventlog_backuplog
1037 Backup Eventlog File
1038
1039 eventlog_loginfo
1040 Get Eventlog Information
1041
1042 IRemoteWinspool
1043 winspool_AsyncOpenPrinter
1044 Open printer handle
1045
1046 winspool_AsyncCorePrinterDriverInstalled
1047 Query Core Printer Driver Installed
1048
1049 NTSVCS
1050 ntsvcs_getversion
1051 Query NTSVCS version
1052
1053 ntsvcs_validatedevinst
1054 Query NTSVCS device instance
1055
1056 ntsvcs_hwprofflags
1057 Query NTSVCS HW prof flags
1058
1059 ntsvcs_hwprofinfo
1060 Query NTSVCS HW prof info
1061
1062 ntsvcs_getdevregprop
1063 Query NTSVCS device registry property
1064
1065 ntsvcs_getdevlistsize
1066 Query NTSVCS device list size
1067
1068 ntsvcs_getdevlist
1069 Query NTSVCS device list
1070
1071 MDSSVC
1072 fetch_properties
1073 Fetch connection properties
1074
1075 fetch_attributes
1076 Fetch attributes for a CNID
1077
1078 WINREG
1079 winreg_enumkey
1080 Enumerate Keys
1081
1082 querymultiplevalues
1083 Query multiple values
1084
1085 querymultiplevalues2
1086 Query multiple values
1087
1088 WITNESS
1089 GetInterfaceList
1090 List the interfaces to which witness client connections can be made
1091
1092 Register
1093 Register for resource state change notifications of a NetName and
1094 IPAddress
1095
1096 UnRegister
1097 Unregister for notifications from the server
1098
1099 AsyncNotify
1100 Request notification of registered resource changes from the server
1101
1102 RegisterEx
1103 Register for resource state change notifications of a NetName,
1104 ShareName and multiple IPAddresses
1105
1106 WKSSVC
1107 wkssvc_wkstagetinfo
1108 Query WKSSVC Workstation Information
1109
1110 wkssvc_getjoininformation
1111 Query WKSSVC Join Information
1112
1113 wkssvc_messagebuffersend
1114 Send WKSSVC message
1115
1116 wkssvc_enumeratecomputernames
1117 Enumerate WKSSVC computer names
1118
1119 wkssvc_enumerateusers
1120 Enumerate WKSSVC users
1121
1122 GENERAL OPTIONS
1123 help
1124 Get help on commands
1125
1126 ?
1127 Get help on commands
1128
1129 debuglevel
1130 Set debug level
1131
1132 debug
1133 Set debug level
1134
1135 list
1136 List available commands on pipe
1137
1138 exit
1139 Exit program
1140
1141 quit
1142 Exit program
1143
1144 sign
1145 Force RPC pipe connections to be signed
1146
1147 seal
1148 Force RPC pipe connections to be sealed
1149
1150 packet
1151 Force RPC pipe connections with packet authentication level
1152
1153 schannel
1154 Force RPC pipe connections to be sealed with 'schannel'. Force RPC
1155 pipe connections to be sealed with 'schannel'. Assumes valid
1156 machine account to this domain controller.
1157
1158 schannelsign
1159 Force RPC pipe connections to be signed (not sealed) with
1160 'schannel'. Assumes valid machine account to this domain
1161 controller.
1162
1163 timeout
1164 Set timeout (in milliseconds) for RPC operations
1165
1166 transport
1167 Choose ncacn transport for RPC operations
1168
1169 none
1170 Force RPC pipe connections to have no special properties
1171
1173 rpcclient is designed as a developer testing tool and may not be robust
1174 in certain areas (such as command line parsing). It has been known to
1175 generate a core dump upon failures when invalid parameters where passed
1176 to the interpreter.
1177
1178 From Luke Leighton's original rpcclient man page:
1179
1180 WARNING! The MSRPC over SMB code has been developed from examining
1181 Network traces. No documentation is available from the original
1182 creators (Microsoft) on how MSRPC over SMB works, or how the individual
1183 MSRPC services work. Microsoft's implementation of these services has
1184 been demonstrated (and reported) to be... a bit flaky in places.
1185
1186 The development of Samba's implementation is also a bit rough, and as
1187 more of the services are understood, it can even result in versions of
1188 smbd(8) and rpcclient(1) that are incompatible for some commands or
1189 services. Additionally, the developers are sending reports to
1190 Microsoft, and problems found or reported to Microsoft are fixed in
1191 Service Packs, which may result in incompatibilities.
1192
1194 This man page is part of version 4.18.9 of the Samba suite.
1195
1197 The original Samba software and related utilities were created by
1198 Andrew Tridgell. Samba is now developed by the Samba Team as an Open
1199 Source project similar to the way the Linux kernel is developed.
1200
1201 The original rpcclient man page was written by Matthew Geddes, Luke
1202 Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion
1203 to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to
1204 DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.
1205
1206
1207
1208Samba 4.18.9 11/30/2023 RPCCLIENT(1)