# 135 - MSRPC

TCP 135 is the Endpoint Mapper and Component Object Model (COM) Service Control Manager.

## Enumeration

### Nmap

Queries an MSRPC endpoint mapper for a list of mapped services and displays the gathered information.

```
nmap <target> --script=msrpc-enum
```

### rpcdump.py

rpcdump.py from Impacket that will show these mappings of RPC

for unauthenticated RPC mapping use:

`python3 rpcdump.py '':''@10.10.10.213`

### rpcmap.py

rpcmap.py from Impacket that will show these mappings of RPC

```
rpcmap.py 'ncacn_ip_tcp:10.10.10.213'
```

### IOXIDResolver

IOXIDResolver could be used to obtain information on other interfaces from RPC mapping

```
oxdf@parrot$ python3 IOXIDResolver.py -t 10.10.10.213
[*] Retrieving network interface of 10.10.10.213
Address: apt
Address: 10.10.10.213
Address: dead:beef::b885:d62a:d679:573f
Address: dead:beef::9514:421b:5cde:a7da
```


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://infra.newerasec.com/infrastructure-testing/enumeration/services-ports/135-msrpc.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
