MSRPC (135)
Default port =135
========================Connect to an RPC share without a username and password and enumerate privledges :
>>> rpcclient --user="" --command=enumprivs -N $IP
========================Connect to an RPC share with a username and enumerate privledges :
>>> rpcclient --user="<Username>" --command=enumprivs $IP
----------------------------------------------------------------------------------------------------------------
========================Enumerate, shows if any NFS mount exposed:
>>> rpcinfo -p $ip
>>> nmap $ip --script=msrpc-enum
msf > use exploit/windows/dcerpc/ms03_026_dcom
Last updated