@@ -277,7 +277,7 @@ def dictionaryAttack():
277277 if hash_ == current :
278278 results .append ((user , hash_ , word ))
279279 clearConsoleLine ()
280- dataToStdout ("[%s] [INFO] found: %s \n " % (time .strftime ("%X" ), word ), True )
280+ dataToStdout ("[%s] [INFO] found: '%s' for user: '%s' \n " % (time .strftime ("%X" ), word , user ), True )
281281 attack_info .remove (item )
282282
283283 elif count % 1117 == 0 or count == length or hash_regex in (HASH .ORACLE_OLD ):
@@ -297,7 +297,7 @@ def dictionaryAttack():
297297 if hash_ == current :
298298 results .append ((user , hash_ , word ))
299299 clearConsoleLine ()
300- dataToStdout ("[%s] [INFO] found: %s \n " % (time .strftime ("%X" ), word ), True )
300+ dataToStdout ("[%s] [INFO] found: '%s' for user: '%s' \n " % (time .strftime ("%X" ), word , user ), True )
301301 break
302302
303303 elif count % 1117 == 0 or count == length or hash_regex in (HASH .ORACLE_OLD ):
@@ -309,7 +309,7 @@ def dictionaryAttack():
309309 for (user , hash_ , password ) in results :
310310 for i in xrange (len (kb .data .cachedUsersPasswords [user ])):
311311 if kb .data .cachedUsersPasswords [user ][i ] and hash_ .lower () in kb .data .cachedUsersPasswords [user ][i ].lower ():
312- kb .data .cachedUsersPasswords [user ][i ] += "%s password: %s" % ('\n ' if kb .data .cachedUsersPasswords [user ][i ][- 1 ] != '\n ' else '' , password )
312+ kb .data .cachedUsersPasswords [user ][i ] += "%s clear-text password: %s" % ('\n ' if kb .data .cachedUsersPasswords [user ][i ][- 1 ] != '\n ' else '' , password )
313313
314314 else :
315315 warnMsg = "unknown hash format. "
0 commit comments