Skip to content

Commit c1e8b56

Browse files
authored
update documentation (#33)
Co-authored-by: DidierA <[email protected]>
1 parent c66e216 commit c1e8b56

File tree

1 file changed

+6
-8
lines changed

1 file changed

+6
-8
lines changed

README.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -63,10 +63,9 @@ sudo apt install python3-dploot
6363
## Usage
6464

6565
```text
66-
dploot (https://github.com/zblurx/dploot) v3.0.0 by @_zblurx
66+
dploot (https://github.com/zblurx/dploot) v3.1.2 by @_zblurx
6767
usage: dploot [-h]
68-
{certificates,credentials,masterkeys,vaults,backupkey,blob,rdg,sccm,triage,machinemasterkeys,machinecredentials,machinevaults,machinecertificates,machinetriage,browser,wifi,mobaxterm,wam}
69-
...
68+
{backupkey,blob,browser,certificates,credentials,machinecertificates,machinecredentials,machinemasterkeys,machinetriage,machinevaults,masterkeys,mobaxterm,rdg,sccm,triage,vaults,wam,wifi} ...
7069
7170
DPAPI looting locally remotely in Python
7271
@@ -82,8 +81,7 @@ positional arguments:
8281
Dump system certificates from local or remote target
8382
machinecredentials Dump system credentials from local or remote target
8483
machinemasterkeys Dump system masterkey from local or remote target
85-
machinetriage Loot SYSTEM Masterkeys (if not set), SYSTEM credentials, SYSTEM certificates and SYSTEM vaults from local or remote
86-
target
84+
machinetriage Loot SYSTEM Masterkeys (if not set), SYSTEM credentials, SYSTEM certificates and SYSTEM vaults from local or remote target
8785
machinevaults Dump system vaults from local or remote target
8886
masterkeys Dump users masterkey from local or remote target
8987
mobaxterm Dump Passwords and Credentials from MobaXterm
@@ -120,13 +118,13 @@ $ dploot machinecertificates -d waza.local -u Administrator -p 'Password!123' -t
120118
A different way of gaining local administrator access to a system, for instance via physical access, extracting the drive and mounting the filesystem directly on your machine. To use this mode, specify `LOCAL` as the target. By default the target filesystem is expected to be the current directory, you can specify a different path with `-root`:
121119

122120
```text
123-
$ dploot sccm -root /media/C_drive/ LOCAL
124-
[*] Connected to LOCAL as \None (admin)
121+
$ dploot sccm -root /media/C_drive/ -t LOCAL
122+
[*] Connected to LOCAL as \ (admin)
125123
```
126124

127125
It can still be useful to give valid username and password as arguments, which will be used to decrypt masterkeys (see the instructions in [User Triage](#user-triage) below):
128126
```text
129-
$ dploot masterkeys -root /mnt -u bob -p Password LOCAL
127+
$ dploot masterkeys -root /mnt -u bob -p Password -t LOCAL
130128
[*] Connected to LOCAL as \bob (admin)
131129
```
132130

0 commit comments

Comments
 (0)