Command Line Tools
Cytomic Orion supports rt.exe. This program provides access to a set of tools you can use to respond to security incidents. These tools enable you to recover information to perform a subsequent forensic analysis, and restore devices affected by a security breach to their original state.
rt.exe is available for Windows computers only.
You can access the rt.exe program from the remote command line. The program has the following syntax:
|
|
Consider these rules regarding the rt.exe program:
-
Each command indicates an action to take and each command supports different parameters.
-
Wildcards * and ? are not supported.
-
Some parameters allow partial searches that use substrings of characters that represent the start, middle, or end of a string. For example, to search for "malware", you can enter these substrings: "mal" or "ware".
-
If a command supports dumping output to a file, this is specified with
-f. -
To separate multiple items of the same type, enter the pipe character (|)
These sections describe the parameters supported by each command.
Delete Command
This command deletes the files specified with the parameters -n, -m, or -s which are in the path indicated by the parameter -p.. If the file is in use, the delete command returns an error.
| Short form | Full parameter | Description | Notes |
|---|---|---|---|
|
h |
-help |
Opens command help. |
|
|
-f |
--force |
Deletes files permanently. |
|
|
-r |
--restore |
Restores selected files from the Recycle Bin. |
Restores files to their original location. |
|
-p |
--path |
Absolute path from the root directory where you want to search for files to delete. The solution only deletes files in the specified path. |
|
|
-n |
--name |
Names of the files you want to delete. |
|
|
-m |
--md5 |
MD5 values of the files you want to delete. |
|
|
-s |
--sha256 |
SHA256 values of the files you want to delete. |
|
Dump Command
This command dumps to disk the memory space allocated to a system or user process.
| Short form | Full parameter | Description | Notes |
|---|---|---|---|
|
h |
-help |
Opens command help. |
|
|
-p |
--pid |
PID of the process to dump. |
For information on how to dump the PID of the process, go to Process Command. |
|
-s |
--system |
Kernel dump. |
Supported values:
|
|
-f |
--filename |
Name of the file that contains the dump. |
|
|
-z |
--zip |
Stores the dump in a ZIP file. |
|
Netinfo Command
Used with the -a parameter, this command shows the settings of the network interfaces installed on the computer.
| Short form | Full parameter | Description | Notes |
|---|---|---|---|
|
h |
-help |
Opens command help. |
|
|
-a |
--all |
Shows the settings of the network interfaces installed on the computer. |
|
|
-f |
--filename |
Name of the file that contains the data. |
|
|
-z |
--zip |
Stores the information in a ZIP file. |
|
Pcap Command
This command captures the network traffic sent and received by the remote computer. Specify the start and end of the capture with the parameters - a start| stop. Packet capture generates temporary files on the computer so there must be sufficient hard disk space. The end result is a PCAP file that can be used directly by the Wireshark/Ethereal program.
| Short form | Full parameter | Description | Notes |
|---|---|---|---|
|
h |
-help |
Opens command help. |
|
|
-a |
--action |
Executes an action:
|
|
|
-m |
--maxsize |
Maximum size of the packet to capture, |
|
|
-i |
--maxtime |
Maximum capture time, |
|
|
-f |
--filename |
Name of the file that contains the data. |
|
|
-z |
--zip |
Stores the information in a ZIP file. |
|
Ports Command
Used with the -a parameter, this command shows the sockets open on the computer and the processes that opened them.
| Short form | Full parameter | Description | Notes |
|---|---|---|---|
|
h |
-help |
Opens command help. |
|
|
-a |
--all |
Shows all open ports and their associated processes. |
|
|
-p |
--pid |
Filters the results by process PID. |
|
|
-n |
--name |
Filters the results by process name. |
You can type only a partial string. |
|
-f |
--filename |
Name of the file that contains the data. |
|
Process Command
Used with the -a parameter, this command shows all processes loaded in the memory of the computer and their modules.
| Short form | Full parameter | Description | Notes |
|---|---|---|---|
|
h |
-help |
Opens command help. |
|
|
-a |
--all |
Shows all processes loaded in the memory of the computer and their modules. |
|
|
-p |
--pid |
Filters the results by process PID, showing the process modules. |
|
|
-u |
--user |
Shows the processes launched by a user and their modules. |
|
|
-f |
--filename |
Name of the file that contains the data. |
|
Url Command
Used with the -a any parameter, this command shows all the URLs accessed by users through the remote computer’s web browser. This command requires that the Cytomic EDR web access control feature is enabled.
| Short form | Full parameter | Description | Notes |
|---|---|---|---|
|
h |
-help |
Opens command help. |
|
|
-a |
--action |
Filters the URL list by the action taken by the web access control feature.
|
|
|
-c |
--count |
Maximum number of URLs to show. |
Default value: unlimited. |
|
-g |
--category |
Filters the URL list by the category assigned by the web access control feature. |
|
|
-b |
--begindate |
Enables you to specify the start date to show visited URLs from. |
|
|
-e |
--enddate |
Enables you to specify the end date to show visited URLs up to. |
|
|
-n |
--urlpattern |
Filters URLs by substring. |
|
|
-u |
--userpattern |
Filters URLs by user. |
|
|
-f |
--filename |
Name of the file that contains the data. |
|
|
-z |
--zip |
Stores the information in a ZIP file. |
|