# Retrieve a file from the host$GetCmd = Invoke-FalconResponderCommand -Command get ` -Argument 'C:\\Temp\\suspicious.exe' ` -SessionId $SessionId -Wait# Check get command statusConfirm-FalconGetFile -SessionId $SessionId -Sha256 $GetCmd.sha256# Download the file (password: 'infected')Receive-FalconGetFile -SessionId $SessionId -Sha256 $GetCmd.sha256 -Path './evidence/'
Files retrieved via RTR are downloaded as password-protected .7z archives with password infected. Handle retrieved files according to your security policies.
Put files are uploaded to CrowdStrike and can be deployed to hosts:
# Upload a put fileSend-FalconPutFile -Path './tools/collector.exe' ` -Name 'collector' ` -Description 'Evidence collector tool' ` -Comment 'IR tool for incident 2024-001'# List put filesGet-FalconPutFile -Detailed -All# Download a put fileGet-FalconPutFile -Filter "name:'collector'" | Receive-FalconPutFile -Path './backup/'# Delete a put fileRemove-FalconPutFile -Id 'abc123_def456'
CrowdStrike provides pre-built scripts in the FalconScript library:
# List available library scriptsGet-FalconLibraryScript -Detailed -All# Find specific scriptGet-FalconLibraryScript -Filter "name:*'network'*" -Detailed
# List all your sessionsGet-FalconSession -All# Search sessions by filterGet-FalconSession -Filter "created_at:>='now-1h'" -Detailed# View sessions across entire CID (requires audit permission)Get-FalconSession -Cid -Filter "user_id:'api-client-*'" -All
# For read-only commandsConfirm-FalconCommand -CloudRequestId $Command.cloud_request_id -SequenceId 0# For active responder commandsConfirm-FalconResponderCommand -CloudRequestId $Command.cloud_request_id# For admin commandsConfirm-FalconAdminCommand -CloudRequestId $Command.cloud_request_id