Index: examples/raiseChild.py --- examples/raiseChild.py.orig +++ examples/raiseChild.py @@ -1252,18 +1252,18 @@ if __name__ == '__main__': if len(sys.argv)==1: parser.print_help() print("\nExamples: ") - print("\tpython raiseChild.py childDomain.net/adminuser\n") + print("\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser\n") print("\tthe password will be asked, or\n") - print("\tpython raiseChild.py childDomain.net/adminuser:mypwd\n") + print("\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser:mypwd\n") print("\tor if you just have the hashes\n") - print("\tpython raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n") + print("\t${MODPY_BIN} raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n") print("\tThis will perform the attack and then psexec against target-exec as Enterprise Admin") - print("\tpython raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n") + print("\t${MODPY_BIN} raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n") print("\tThis will perform the attack and then psexec against target-exec as User with RID 1101") - print("\tpython raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n") + print("\t${MODPY_BIN} raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n") print("\tThis will save the final goldenTicket generated in the ccache target file") - print("\tpython raiseChild.py -w ccache childDomain.net/adminuser\n") + print("\t${MODPY_BIN} raiseChild.py -w ccache childDomain.net/adminuser\n") sys.exit(1) options = parser.parse_args()