28 lines
1.7 KiB
Text
28 lines
1.7 KiB
Text
Index: examples/raiseChild.py
|
|
--- examples/raiseChild.py.orig
|
|
+++ examples/raiseChild.py
|
|
@@ -1252,18 +1252,18 @@ if __name__ == '__main__':
|
|
if len(sys.argv)==1:
|
|
parser.print_help()
|
|
print("\nExamples: ")
|
|
- print("\tpython raiseChild.py childDomain.net/adminuser\n")
|
|
+ print("\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser\n")
|
|
print("\tthe password will be asked, or\n")
|
|
- print("\tpython raiseChild.py childDomain.net/adminuser:mypwd\n")
|
|
+ print("\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser:mypwd\n")
|
|
print("\tor if you just have the hashes\n")
|
|
- print("\tpython raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n")
|
|
+ print("\t${MODPY_BIN} raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n")
|
|
|
|
print("\tThis will perform the attack and then psexec against target-exec as Enterprise Admin")
|
|
- print("\tpython raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n")
|
|
+ print("\t${MODPY_BIN} raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n")
|
|
print("\tThis will perform the attack and then psexec against target-exec as User with RID 1101")
|
|
- print("\tpython raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n")
|
|
+ print("\t${MODPY_BIN} raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n")
|
|
print("\tThis will save the final goldenTicket generated in the ccache target file")
|
|
- print("\tpython raiseChild.py -w ccache childDomain.net/adminuser\n")
|
|
+ print("\t${MODPY_BIN} raiseChild.py -w ccache childDomain.net/adminuser\n")
|
|
sys.exit(1)
|
|
|
|
options = parser.parse_args()
|