Epm tool connects to the RPC Endpoint Mapper on a remote system and lists the dynamic endpoints registered with it. This is useful for discovering which RPC services are running and on which ports or named pipes they are listening.
Endpoint mapper queries are typically unauthenticated. This is distinct from anonymous authentication — no security context is established.
Subcommands
| Command | Description |
|---|---|
| lsep | List dynamic RPC endpoints registered with the endpoint mapper |
For help on any subcommand, run
Epm <subcommand> -h.lsep
Queries the RPC Endpoint Mapper and lists the registered dynamic endpoints. You can filter results by interface ID, version, object GUID, or major version number.Parameters
Parameters
RPC server to interact with.
Filter options
Filter options
Filter for a specific interface ID (GUID).
Filter by major version number.
Filter for an exact interface version.
Filter for a compatible interface version.
Filter for interfaces up to a maximum version.
Filter for a specific object ID.
Number of results to fetch at a time.
Output
Output
Authentication
Authentication
User name to authenticate with (not including the domain).
Password to authenticate with.
NTLM hash for pass-the-hash authentication.
KDC endpoint for Kerberos.
Path to a TGT file (.kirbi or ccache).
Encrypt RPC messages.
Override network address(es) of the server.
SOCKS5 proxy endpoint.