Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

Uninstall Vulnerable Software Remotely

Admin, May 8, 2024August 11, 2025

If you find a ton of boxes running vulnerable software that is no longer used you can use WMI/CIM. What’s the difference? WMI uses TCP ports 135/445/49152-65535 while CIM uses 5985/5986. CIM is slightly faster, but either way works.

WMI way. We are going to search a remote computer named Test for the FortiClient software. We will store this in the $software variable. We will then use the Uninstall() to complete the process

$software=Get-WmiObject -ComputerName Test -Namespace root\cimv2 -Class win32_product | ? name -like *forticlient*; $software.Uninstall()

CIM way. We are going to search a remote computer named Test for the FortiClient software. We will store this in the $software variable. We will then use invoke-cimmethod to complete the process

$software=Get-CimInstance -ComputerName Test -ClassName win32_product | ? name -like *forticlient*; $software | Invoke-CimMethod -MethodName uninstall

Vulnerabilities

Post navigation

Previous post
Next post

Related Posts

AD CS Vulnerabilities

January 11, 2024August 11, 2025

If an attacker gets domain user level permissions they could use tools such as certipy-ad…

Read More

SentinelOne: Why it’s important to monitor and audit your EPP

September 5, 2024August 11, 2025

This is often an overlooked crucial step for endpoint protection software. Sometimes EPP can have…

Read More

ICMP Timestamp Request Remote Date Disclosure

May 8, 2024August 11, 2025

You may have seen this vulnerability pop in Nessus. In order to remediate this we…

Read More

Recent Posts

  • MSSQL Auditing
  • BloodHound CE Setup
  • UBI – User Browsing Isolation
  • Rolling KRBTGT Account
  • SentinelOne: Why it’s important to monitor and audit your EPP

Recent Comments

No comments to show.

Archives

  • August 2025
  • June 2025
  • November 2024
  • September 2024
  • June 2024
  • May 2024
  • March 2024
  • January 2024
  • November 2023
  • September 2023

Categories

  • Audit
  • EPP
  • Tools
  • Uncategorized
  • Vulnerabilities
©2025 CyberOpsSec | WordPress Theme by SuperbThemes