$OpenBSD: patch-examples_raiseChild_py,v 1.4 2016/09/01 12:21:05 dcoppa Exp $
--- examples/raiseChild.py.orig	Tue Jun 28 19:26:31 2016
+++ examples/raiseChild.py	Thu Sep  1 08:05:39 2016
@@ -1443,16 +1443,16 @@ if __name__ == '__main__':
     if len(sys.argv)==1:
         parser.print_help()
         print "\nExamples: "
-        print "\tpython raiseChild.py childDomain.net/adminuser\n"
+        print "\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser\n"
         print "\tthe password will be asked, or\n"
-        print "\tpython raiseChild.py childDomain.net/adminuser:mypwd\n"
+        print "\t${MODPY_BIN} raiseChild.py childDomain.net/adminuser:mypwd\n"
         print "\tor if you just have the hashes\n"
-        print "\tpython raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n"
+        print "\t${MODPY_BIN} raiseChild.py -hashes LMHASH:NTHASH childDomain.net/adminuser\n"
 
         print "\tThis will perform the attack and then psexec against target-exec as Enterprise Admin"
-        print "\tpython raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n"
+        print "\t${MODPY_BIN} raiseChild.py -target-exec targetHost childDomainn.net/adminuser\n"
         print "\tThis will save the final goldenTicket generated in the ccache target file"
-        print "\tpython raiseChild.py -w ccache childDomain.net/adminuser\n"
+        print "\t${MODPY_BIN} raiseChild.py -w ccache childDomain.net/adminuser\n"
         sys.exit(1)
  
     options = parser.parse_args()
