Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 7a14704

Browse files
committed
cosmetics
1 parent f4f0bc9 commit 7a14704

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

lib/utils/hash.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@ def dictionaryAttack():
277277
if hash_ == current:
278278
results.append((user, hash_, word))
279279
clearConsoleLine()
280-
dataToStdout("[%s] [INFO] found: %s\n" % (time.strftime("%X"), word), True)
280+
dataToStdout("[%s] [INFO] found: '%s' for user: '%s'\n" % (time.strftime("%X"), word, user), True)
281281
attack_info.remove(item)
282282

283283
elif count % 1117 == 0 or count == length or hash_regex in (HASH.ORACLE_OLD):
@@ -297,7 +297,7 @@ def dictionaryAttack():
297297
if hash_ == current:
298298
results.append((user, hash_, word))
299299
clearConsoleLine()
300-
dataToStdout("[%s] [INFO] found: %s\n" % (time.strftime("%X"), word), True)
300+
dataToStdout("[%s] [INFO] found: '%s' for user: '%s'\n" % (time.strftime("%X"), word, user), True)
301301
break
302302

303303
elif count % 1117 == 0 or count == length or hash_regex in (HASH.ORACLE_OLD):
@@ -309,7 +309,7 @@ def dictionaryAttack():
309309
for (user, hash_, password) in results:
310310
for i in xrange(len(kb.data.cachedUsersPasswords[user])):
311311
if kb.data.cachedUsersPasswords[user][i] and hash_.lower() in kb.data.cachedUsersPasswords[user][i].lower():
312-
kb.data.cachedUsersPasswords[user][i] += "%s password: %s" % ('\n' if kb.data.cachedUsersPasswords[user][i][-1] != '\n' else '', password)
312+
kb.data.cachedUsersPasswords[user][i] += "%s clear-text password: %s" % ('\n' if kb.data.cachedUsersPasswords[user][i][-1] != '\n' else '', password)
313313

314314
else:
315315
warnMsg = "unknown hash format. "

0 commit comments

Comments
 (0)