diff --git a/README.md b/README.md
index c2f37a9..f424d17 100644
--- a/README.md
+++ b/README.md
@@ -12,9 +12,9 @@ Appears in the USENIX WOOT '17 paper: [fastboot oem vuln: Android Bootloader Vul
## Usage ##
1. Download your favourite OTAs/Factory images and populate with `abootool.py -a
`.
`abootool.py -l` will then show you the populated images.
-2. Hook your device to the nearest USB port and run `abootool.py`. It will try to automatically discover the product or OEM. If it fails, it will fuzz with all of the available strings.
+2. Hook your device to the nearest USB port and run `abootool.py`. It will try to automatically discover the product or OEM. If it fails, it will fuzz the device with all of the available strings.
One can force a specific OEM using `-e ` parameter.
-At the end, the tool will print the discovered commands, discovered restricted commands, and commands which timed-out.
+When it finishes, the tool prints the discovered positive commands (including ones whose response is a fastboot failure), discovered restricted commands, commands which timed-out, and commands which have triggered various errors.
See `abootool.cfg` and `abootool.py -h` for advanced usage.