# **Basic Information** According to [HTB Academy](https://academy.hackthebox.com/module/112/section/1242): > Windows Management Instrumentation (`WMI`) is Microsoft's implementation and also an extension of the Common Information Model (`CIM`), core functionality of the standardized Web-Based Enterprise Management (`WBEM`) for the Windows platform. WMI allows read and write access to almost all settings on Windows systems. > > The initialization of the WMI communication always takes place on `TCP` port `135`, and after the successful establishment of the connection, the communication is moved to a random port.> # **Enumeration** ## **Scanning** ```bash ``` ## **Initiate a WMI Session** ```bash # run the specified command on target, in this case the hostname command impacket-wmiexec <username>:"<password>"@<target_ip> "hostname" ``` # **References** # **Practical Application** | Platform | Name | Notes | | -------- | ---- | ----- | | | | |