Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

Uninstall Vulnerable Software Remotely

Admin, May 8, 2024August 11, 2025

If you find a ton of boxes running vulnerable software that is no longer used you can use WMI/CIM. What’s the difference? WMI uses TCP ports 135/445/49152-65535 while CIM uses 5985/5986. CIM is slightly faster, but either way works.

WMI way. We are going to search a remote computer named Test for the FortiClient software. We will store this in the $software variable. We will then use the Uninstall() to complete the process

$software=Get-WmiObject -ComputerName Test -Namespace root\cimv2 -Class win32_product | ? name -like *forticlient*; $software.Uninstall()

CIM way. We are going to search a remote computer named Test for the FortiClient software. We will store this in the $software variable. We will then use invoke-cimmethod to complete the process

$software=Get-CimInstance -ComputerName Test -ClassName win32_product | ? name -like *forticlient*; $software | Invoke-CimMethod -MethodName uninstall

Vulnerabilities

Post navigation

Previous post
Next post

Related Posts

Patch Mgmt – Windows Update Issues

November 6, 2025November 6, 2025

What if your patch management solution fails to install certain updates? The answer: WinRM and…

Read More

Disable mDNS

March 13, 2024August 11, 2025

Issuing netstat and lsof commands to view UDP 5353 connections/listening ports shows that the avahi-daemon…

Read More

SentinelOne: Why it’s important to monitor and audit your EPP

September 5, 2024August 11, 2025

This is often an overlooked crucial step for endpoint protection software. Sometimes EPP can have…

Read More

Recent Posts

  • Patch Mgmt – Windows Update Issues
  • MSSQL Auditing
  • BloodHound CE Setup
  • UBI – User Browsing Isolation
  • Rolling KRBTGT Account

Recent Comments

No comments to show.

Archives

  • November 2025
  • August 2025
  • June 2025
  • November 2024
  • September 2024
  • June 2024
  • May 2024
  • March 2024
  • January 2024
  • November 2023
  • September 2023

Categories

  • Audit
  • EPP
  • Tools
  • Uncategorized
  • Vulnerabilities
©2026 CyberOpsSec | WordPress Theme by SuperbThemes