Skip to content

Commit

Permalink
Modify help message
Browse files Browse the repository at this point in the history
  • Loading branch information
0xdeaddood committed Dec 16, 2019
1 parent a32f917 commit fff7bc3
Showing 1 changed file with 4 additions and 1 deletion.
5 changes: 4 additions & 1 deletion examples/raiseChild.py
Original file line number Diff line number Diff line change
Expand Up @@ -1233,7 +1233,8 @@ def exploit(self):
#parser.add_argument('-dc-ip', action='store',metavar = "ip address", help='IP Address of the domain controller (needed to get the user''s SID). If omitted it will use the domain part (FQDN) specified in the target parameter')
parser.add_argument('-target-exec', action='store',metavar = "target address", help='Target host you want to PSEXEC '
'against once the main attack finished')
parser.add_argument('-targetRID', action='store', default='500', help='Target user RID you want to dump credentials. Administrator (500) by default)')
parser.add_argument('-targetRID', action='store', metavar = "RID", default='500', help='Target user RID you want to '
'dump credentials. Administrator (500) by default.')

group = parser.add_argument_group('authentication')

Expand All @@ -1256,6 +1257,8 @@ def exploit(self):

print("\tThis will perform the attack and then psexec against target-exec as Enterprise Admin")
print("\tpython raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n")
print("\tThis will perform the attack and then psexec against target-exec as User with RID 1101")
print("\tpython raiseChild.py -target-exec targetHost -targetRID 1101 childDomainn.net/adminuser\n")
print("\tThis will save the final goldenTicket generated in the ccache target file")
print("\tpython raiseChild.py -w ccache childDomain.net/adminuser\n")
sys.exit(1)
Expand Down

0 comments on commit fff7bc3

Please sign in to comment.