Couldn’t find a good source online… so here they are.
Syntax:
SecureCRT.exe [standard options] [protocol-specific options]
Standard Command-Line Options
Standard Option |
Arguments |
Description |
/ARG |
argument |
Passes option(s) to SecureCRT scripts by way of Arguments scripting objects. More than one /ARG option can be used in a command. |
/COLOR_SCHEME |
scheme |
Specifies an existing color scheme A combination of session settings that specify a variety of colors associated with the terminal window, including foreground and background. to be used for the session A session is a set of options that are assigned to a connection to a remote machine. These settings and options are saved under a session name and allow the user to have different preferences for different hos being started. When this switch is used, any changes to the session color scheme will be ignored. If a nonexistent scheme is specified, the session configuration color scheme will be used. |
/F |
folder |
Points to an alternate configuration folder location. If there is no configuration file in the alternate folder, SecureCRT will create one. Without this option, SecureCRT will use the configuration information in the default folder location. |
/FIREWALL |
firewall |
Connects session using specified firewall settings. Replaces /PROXY and /SOCKS options. The format of this command is as follows: /FIREWALL=<name> If the firewall name contains spaces, it If no firewall argument is specified, SecureCRT will use the firewall specified by the session being connected. If the session firewall is set to None, SecureCRT will use the firewall specified in the current global firewall settings. If a firewall is named in the command argument, SecureCRT will temporarily override the session’s firewall settings and use the firewall specified for the current session. Note: Using SecureCRT’s dependent session option on the command line or in the connect bar (as in the following example), it’s possible to link a session to an SSH2 session that it depends on, which allows connection to a jump host before connecting to other sessions. Both the command line and the connect bar use the normal /Firewall specifier and the firewall will be Session:<session name> with the following syntax. /FIREWALL=Session:<Session Session: is case insensitive. |
/LOG |
filename |
Specifies a log file to be used for the session being started. |
/MAX_COLS |
n |
Specifies the maximum number of columns. The maximum value for n is 1024 and the minimum value is 132. |
/N |
tabname |
Specifies the name to display on the tab. |
/NOMENU |
Hides the menu bar. |
|
/NOTOOLBAR |
Hides the toolbar. |
|
/NOSAVE |
No changes to settings will be saved. |
|
/POS |
x y |
Specifies the initial position of the SecureCRT window, where x and y specify the upper left corner of the SecureCRT window in pixel coordinates. |
/SCRIPT |
filename |
Runs script contained in filename. |
/SESSION_FOLDER |
folder |
Opens the sessions in the specified folder that would be opened if the folder was designated as an auto session. /SESSION_FOLDER \ The /SESSION_FOLDER option can be used with the /S option. |
/TITLEBAR |
“Title |
Sets the text in the title bar to the string given as argument. |
Protocol-Specific Command-Line Options
Protocol Option And Mandatory Arguments |
Related Options and Arguments |
Description |
/S session_name |
none |
Starts SecureCRT and opens a connection A data path or circuit between two computers over a phone line, network cable, or other meanswith session_name. If session_name includes any spaces, it must be enclosed with quotation marks, (e.g., “My Session”). Multiple sessions can be opened by specifying multiple “/S session_name” argument pairs on the command line. Note: |
/T |
/S |
When used in conjunction with the /S options, the /T option opens the specified session or sessions in a separate tab or tabs. For example, the command: /T /S alpha opens session alpha in a new tab. The command: /T /S alpha /S beta opens both sessions alpha and beta in their Note: The /T option can also be used with “ad hoc” sessions such as: /T /SSH2 myserver |
/SSH1 [ssh_options] hostname |
none |
Starts SecureCRT and opens the default session with the SSH1 protocol and begins connecting to hostname. SecureCRT also Note: |
[ /ACCEPTHOSTKEYS ] |
Instructs SecureCRT to automatically accept host keys. |
|
[ / C cipher An algorithm used to encrypt data at varying levels of security. Examples include 3DES, AES, Blowfish, RC4, and Twofish. ] |
Specifies a cipher for encrypting the session. Valid values for SSH1 cipher are NONE, DES, 3DES, RC4 and BLOWFISH. The default SSH1 cipher is 3DES. |
|
[ /ENCRYPTEDPASSWORD password ] |
Specifies a password in encrypted form. This password must have been encrypted by SecureCRT. To obtain an encrypted password, specify a password in the Session Options dialog, then open that session’s .ini file and copy the encrypted string from the Password To use passwords in scripts, refer to the Session Object Connect method. |
|
[ /I identityfile ] |
Specifies the location of the user’s identity file Identity files are two files containing the public-private key pair used to connect to an SSH server using RSA or DSA authentication. The Identity file contains the public and private key pair and is used by SecureCRT. The Identity.pub file contains only the public key which is usually appended to the authorized_keys file. |
|
[ /L username |
Specifies the username when connecting to the SSH1 server A computer program that provides services to other computer programs (called clients). Often the computer on which a server program runs is also called a server. The term host is often used as a synonym for server. . |
|
[ /P port |
Specifies the SSH server port. The default value is 22. |
|
[ /PASSPHRASE passphrase ] |
Logs on to the SSH1 server using passphrase |
|
[ /PASSWORD password ] |
Logs on to the SSH1 server using password as the password for the username given with the /L option. |
|
[ /Z compressionlevel ] |
Specifies the compression level from 1 (lowest compression = fastest) to 9 (highest compression = slowest). Setting this option to 0 turns off compression. |
/SSH2 [ssh_options] hostname |
none |
Starts SecureCRT and opens the default session with the SSH2 protocol and begins connecting to hostname. SecureCRT also accepts username@hostname syntax. Note: |
[ /ACCEPTHOSTKEYS ] |
Instructs SecureCRT to automatically accept host keys. |
|
[ /AUTH method ] |
Specifies the authentication method(s) to be attempted when connecting to the SSH2 server. If multiple methods are specified, they must be comma-separated with no spaces (i.e., /AUTH password, publickey, keyboard-interactive, gssapi) |
|
[ /C cipher ] |
Specifies a cipher for encrypting the session. Valid values for SSH2 cipher are NONE, 3DES, RC4, and TWOFISH. The default SSH2 cipher is 3DES. |
|
[ /COMPRESSIONS type ] |
Specifies the compression type for the session. Valid values for SSH2 compression type are NONE, ZLIB, and ZLIB@OPENSSH.COM. The default type is |
|
[ /ENCRYPTEDPASSWORD password ] |
Specifies a password in encrypted form. To obtain an encrypted password, specify a password in the Session Options dialog, then open that session’s .ini file and copy the encrypted string from the Password field. To use passwords in scripts, refer to the Session Object Connect method. |
|
[ /I identityfile ] |
Specifies the location of the user’s identity file. The identity file contains the private key needed to connect to the server using public-key authentication. The absence of this option causes password authentication to be used. |
|
[ /L username ] |
Specifies the username when connecting to the SSH2 server. |
|
[ /LOCAL [localip:]localport:hostname:hostport] |
Allows you to specify a local listening IP address when setting up a port forward (not required), and forwards connection requests from localport (on localhost) to hostport on hostname. |
|
[ /M MAC Message Authentication Code. A component of the SSH2 protocol consisting of a hashing algorithm used to ensure data integrity between an SSH2 client and an SSH2 server communicating over a TCP/IP network such as the internet. The MAC ensures data integrity by protecting against message alteration. ] |
Specifies the Message Authentication Code (MAC) to use. |
|
[ /P port ] |
Specifies the SSH2 server port. The default value is 22. |
|
[ /PASSPHRASE passphrase ] |
Logs on to the SSH2 server using passphrase as the passphrase for the identity file given with the /L option. |
|
[ /PASSWORD password ] |
Logs on to the SSH2 server using password as the password for the username given with the /L option. |
|
[/REMOTE [listenip:]listenport:destination-host:destination-port] |
Allows you to specify a remote listening IP address when setting up a remote forward (not required), and requests the SSH2 server to accept connection requests on listenport |
|
[ /Z compressionlevel ] |
Specifies the compression level from 1 (lowest compression = fastest) to 9 (highest compression = slowest). Setting this option to 0 turns off compression. |
/TELNET hostname [port] |
none |
Starts SecureCRT and opens the default session with the Telnet protocol and begins connecting to [port] on hostname. |
/RLOGIN |
none |
Starts SecureCRT and opens the default session with the rlogin protocol and begins connecting to hostname. SecureCRT also accepts username@hostname syntax. |
[ /L username ] |
Specifies the username to use with the rlogin protocol. |
|
/TAPI phone_number |
none |
Starts SecureCRT and opens the default session with the TAPI protocol and begins connecting to the specified phone number. Note: /TAPI “+1 (555) 555-5555” |
[ /REDIAL attempts ] |
Specifies the number of redial attempts that SecureCRT will make before giving up on the |
/SERIAL port |
none |
Starts SecureCRT and opens the default session with port. Note: |
[ /BAUD baudrate ] |
Set the baud rate. Valid values for baudrate are 110, 300, 600, 1200, 2400, 4800, 9600, 14400, 19200, 38400, 57600, 115200, 230400, 380400, 460800, and 921600. The default value is 38400. |
|
[ /CTS | /NOCTS ] |
Enable or Disable RTS/CTS (request-to-send/clear-to-send) hardware flow control. By default, RTS/CTS is enabled. |
|
[ /DATA databits ] |
Set the data bits. Valid values for n are 5, 6, 7 or 8. The default value is 8. |
|
[ /DSR | /NODSR ] |
Enable or Disable DTR/DSR (data-terminal-ready/data-set-ready). By default, DTR/DSR are not enabled. |
|
[ /PARITY parity ] |
Set the parity. Valid values for parity |
|
[ /STOP stopbits ] |
Sets the stop bits. Valid values for stopbits |
|
[ /XON | /NOXON] |
Enable or Disable XON/XOFF software flow control. By default, software flow control is disabled. |
Interested in stealth mode. That is no display at all.
This is usefull for scripts.
Please advise
Hi Egon! I don’t know of a way to go stealth within SecureCRT itself. I’ve only used it in a stealthy way by using window options within vbs or javascript (https://ss64.com/vb/run.html).