Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit cda25cd

Browse files
committed
Cosmetics
1 parent 3583d6d commit cda25cd

1 file changed

Lines changed: 8 additions & 9 deletions

File tree

lib/utils/hash.py

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
#!/usr/bin/env python
2-
# -*- coding: utf-8 -*-
32

43
"""
54
$Id$
@@ -278,8 +277,8 @@ def attackDumpedTable():
278277
attack_dict['%s%d' % (DUMMY_USER_PREFIX, i)] = [value]
279278

280279
if attack_dict:
281-
message = "recognized possible password hash values. "
282-
message += "do you want to use dictionary attack on retrieved table items? [Y/n/q]"
280+
message = "recognized possible password hashes. Do you want to "
281+
message += "crack them via a dictionary-based attack? [Y/n/q]"
283282
test = readInput(message, default="Y")
284283

285284
if test[0] in ("n", "N"):
@@ -349,7 +348,7 @@ def __bruteProcessVariantA(attack_info, hash_regex, wordlist, suffix, retVal, pr
349348

350349
clearConsoleLine()
351350

352-
infoMsg = "[%s] [INFO] found password '%s'" % (time.strftime("%X"), word)
351+
infoMsg = "[%s] [INFO] cracked password '%s'" % (time.strftime("%X"), word)
353352

354353
if user and not user.startswith(DUMMY_USER_PREFIX):
355354
infoMsg += " for user '%s'\n" % user
@@ -401,7 +400,7 @@ def __bruteProcessVariantB(user, hash_, kwargs, hash_regex, wordlist, suffix, re
401400

402401
clearConsoleLine()
403402

404-
infoMsg = "[%s] [INFO] found password '%s'" % (time.strftime("%X"), word)
403+
infoMsg = "[%s] [INFO] cracked password '%s'" % (time.strftime("%X"), word)
405404

406405
if user and not user.startswith(DUMMY_USER_PREFIX):
407406
infoMsg += " for user '%s'\n" % user
@@ -445,7 +444,7 @@ def dictionaryAttack(attack_dict):
445444

446445
if regex and regex not in hash_regexes:
447446
hash_regexes.append(regex)
448-
infoMsg = "using hash method: '%s'" % __functions__[regex].func_name
447+
infoMsg = "using hash method '%s'" % __functions__[regex].func_name
449448
logger.info(infoMsg)
450449

451450
for hash_regex in hash_regexes:
@@ -525,7 +524,7 @@ def dictionaryAttack(attack_dict):
525524
if test[0] in ("y", "Y"):
526525
suffix_list += COMMON_PASSWORD_SUFFIXES
527526

528-
infoMsg = "starting dictionary attack (%s)" % __functions__[hash_regex].func_name
527+
infoMsg = "starting dictionary-based cracking (%s)" % __functions__[hash_regex].func_name
529528
logger.info(infoMsg)
530529

531530
for item in attack_info:
@@ -541,7 +540,7 @@ def dictionaryAttack(attack_dict):
541540

542541
if suffix:
543542
clearConsoleLine()
544-
infoMsg = "using suffix: '%s'" % suffix
543+
infoMsg = "using suffix '%s'" % suffix
545544
logger.info(infoMsg)
546545

547546
kb.wordlist.rewind()
@@ -597,7 +596,7 @@ def dictionaryAttack(attack_dict):
597596

598597
if suffix:
599598
clearConsoleLine()
600-
infoMsg = "using suffix: '%s'" % suffix
599+
infoMsg = "using suffix '%s'" % suffix
601600
logger.info(infoMsg)
602601

603602
kb.wordlist.rewind()

0 commit comments

Comments
 (0)