11#!/usr/bin/env python
2- # -*- coding: utf-8 -*-
32
43"""
54$Id$
@@ -278,8 +277,8 @@ def attackDumpedTable():
278277 attack_dict ['%s%d' % (DUMMY_USER_PREFIX , i )] = [value ]
279278
280279 if attack_dict :
281- message = "recognized possible password hash values. "
282- message += "do you want to use dictionary attack on retrieved table items ? [Y/n/q]"
280+ message = "recognized possible password hashes. Do you want to "
281+ message += "crack them via a dictionary-based attack? [Y/n/q]"
283282 test = readInput (message , default = "Y" )
284283
285284 if test [0 ] in ("n" , "N" ):
@@ -349,7 +348,7 @@ def __bruteProcessVariantA(attack_info, hash_regex, wordlist, suffix, retVal, pr
349348
350349 clearConsoleLine ()
351350
352- infoMsg = "[%s] [INFO] found password '%s'" % (time .strftime ("%X" ), word )
351+ infoMsg = "[%s] [INFO] cracked password '%s'" % (time .strftime ("%X" ), word )
353352
354353 if user and not user .startswith (DUMMY_USER_PREFIX ):
355354 infoMsg += " for user '%s'\n " % user
@@ -401,7 +400,7 @@ def __bruteProcessVariantB(user, hash_, kwargs, hash_regex, wordlist, suffix, re
401400
402401 clearConsoleLine ()
403402
404- infoMsg = "[%s] [INFO] found password '%s'" % (time .strftime ("%X" ), word )
403+ infoMsg = "[%s] [INFO] cracked password '%s'" % (time .strftime ("%X" ), word )
405404
406405 if user and not user .startswith (DUMMY_USER_PREFIX ):
407406 infoMsg += " for user '%s'\n " % user
@@ -445,7 +444,7 @@ def dictionaryAttack(attack_dict):
445444
446445 if regex and regex not in hash_regexes :
447446 hash_regexes .append (regex )
448- infoMsg = "using hash method: '%s'" % __functions__ [regex ].func_name
447+ infoMsg = "using hash method '%s'" % __functions__ [regex ].func_name
449448 logger .info (infoMsg )
450449
451450 for hash_regex in hash_regexes :
@@ -525,7 +524,7 @@ def dictionaryAttack(attack_dict):
525524 if test [0 ] in ("y" , "Y" ):
526525 suffix_list += COMMON_PASSWORD_SUFFIXES
527526
528- infoMsg = "starting dictionary attack (%s)" % __functions__ [hash_regex ].func_name
527+ infoMsg = "starting dictionary-based cracking (%s)" % __functions__ [hash_regex ].func_name
529528 logger .info (infoMsg )
530529
531530 for item in attack_info :
@@ -541,7 +540,7 @@ def dictionaryAttack(attack_dict):
541540
542541 if suffix :
543542 clearConsoleLine ()
544- infoMsg = "using suffix: '%s'" % suffix
543+ infoMsg = "using suffix '%s'" % suffix
545544 logger .info (infoMsg )
546545
547546 kb .wordlist .rewind ()
@@ -597,7 +596,7 @@ def dictionaryAttack(attack_dict):
597596
598597 if suffix :
599598 clearConsoleLine ()
600- infoMsg = "using suffix: '%s'" % suffix
599+ infoMsg = "using suffix '%s'" % suffix
601600 logger .info (infoMsg )
602601
603602 kb .wordlist .rewind ()
0 commit comments