26 lines
1.5 KiB
Plaintext
26 lines
1.5 KiB
Plaintext
$OpenBSD: patch-examples_raiseChild_py,v 1.4 2016/09/01 12:21:05 dcoppa Exp $
|
|
--- examples/raiseChild.py.orig Tue Jun 28 19:26:31 2016
|
|
+++ examples/raiseChild.py Thu Sep 1 08:05:39 2016
|
|
@@ -1443,16 +1443,16 @@ if __name__ == '__main__':
|
|
if len(sys.argv)==1:
|
|
parser.print_help()
|
|
print "\nExamples: "
|
|
- print "\tpython raiseChild.py childDomain.net/adminuser\n"
|
|
+ print "\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser\n"
|
|
print "\tthe password will be asked, or\n"
|
|
- print "\tpython raiseChild.py childDomain.net/adminuser:mypwd\n"
|
|
+ print "\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser:mypwd\n"
|
|
print "\tor if you just have the hashes\n"
|
|
- print "\tpython raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n"
|
|
+ print "\t${MODPY_BIN} raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n"
|
|
|
|
print "\tThis will perform the attack and then psexec against target-exec as Enterprise Admin"
|
|
- print "\tpython raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n"
|
|
+ print "\t${MODPY_BIN} raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n"
|
|
print "\tThis will save the final goldenTicket generated in the ccache target file"
|
|
- print "\tpython raiseChild.py -w ccache childDomain.net/adminuser\n"
|
|
+ print "\t${MODPY_BIN} raiseChild.py -w ccache childDomain.net/adminuser\n"
|
|
sys.exit(1)
|
|
|
|
options = parser.parse_args()
|