# **Basic Information**
According to [HTB Academy](https://academy.hackthebox.com/module/112/section/1242):
> Windows Management Instrumentation (`WMI`) is Microsoft's implementation and also an extension of the Common Information Model (`CIM`), core functionality of the standardized Web-Based Enterprise Management (`WBEM`) for the Windows platform. WMI allows read and write access to almost all settings on Windows systems.
>
> The initialization of the WMI communication always takes place on `TCP` port `135`, and after the successful establishment of the connection, the communication is moved to a random port.>
# **Enumeration**
## **Scanning**
```bash
```
## **Initiate a WMI Session**
```bash
# run the specified command on target, in this case the hostname command
impacket-wmiexec <username>:"<password>"@<target_ip> "hostname"
```
# **References**
# **Practical Application**
| Platform | Name | Notes |
| -------- | ---- | ----- |
| | | |