ports/net/py-impacket/patches/patch-examples_raiseChild_py

28 lines
1.7 KiB
Text

Index: examples/raiseChild.py
--- examples/raiseChild.py.orig
+++ examples/raiseChild.py
@@ -1252,18 +1252,18 @@ if __name__ == '__main__':
if len(sys.argv)==1:
parser.print_help()
print("\nExamples: ")
- print("\tpython raiseChild.py childDomain.net/adminuser\n")
+ print("\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser\n")
print("\tthe password will be asked, or\n")
- print("\tpython raiseChild.py childDomain.net/adminuser:mypwd\n")
+ print("\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser:mypwd\n")
print("\tor if you just have the hashes\n")
- print("\tpython raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n")
+ print("\t${MODPY_BIN} raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n")
print("\tThis will perform the attack and then psexec against target-exec as Enterprise Admin")
- print("\tpython raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n")
+ print("\t${MODPY_BIN} raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n")
print("\tThis will perform the attack and then psexec against target-exec as User with RID 1101")
- print("\tpython raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n")
+ print("\t${MODPY_BIN} raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n")
print("\tThis will save the final goldenTicket generated in the ccache target file")
- print("\tpython raiseChild.py -w ccache childDomain.net/adminuser\n")
+ print("\t${MODPY_BIN} raiseChild.py -w ccache childDomain.net/adminuser\n")
sys.exit(1)
options = parser.parse_args()