From 7a147041c4398b2aa08fce2d1ca5b2a3a23cffd6 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Tue, 23 Nov 2010 21:44:58 +0000 Subject: [PATCH] cosmetics --- lib/utils/hash.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/utils/hash.py b/lib/utils/hash.py index 1367aad30..bd6df79c4 100644 --- a/lib/utils/hash.py +++ b/lib/utils/hash.py @@ -277,7 +277,7 @@ def dictionaryAttack(): if hash_ == current: results.append((user, hash_, word)) clearConsoleLine() - dataToStdout("[%s] [INFO] found: %s\n" % (time.strftime("%X"), word), True) + dataToStdout("[%s] [INFO] found: '%s' for user: '%s'\n" % (time.strftime("%X"), word, user), True) attack_info.remove(item) elif count % 1117 == 0 or count == length or hash_regex in (HASH.ORACLE_OLD): @@ -297,7 +297,7 @@ def dictionaryAttack(): if hash_ == current: results.append((user, hash_, word)) clearConsoleLine() - dataToStdout("[%s] [INFO] found: %s\n" % (time.strftime("%X"), word), True) + dataToStdout("[%s] [INFO] found: '%s' for user: '%s'\n" % (time.strftime("%X"), word, user), True) break elif count % 1117 == 0 or count == length or hash_regex in (HASH.ORACLE_OLD): @@ -309,7 +309,7 @@ def dictionaryAttack(): for (user, hash_, password) in results: for i in xrange(len(kb.data.cachedUsersPasswords[user])): if kb.data.cachedUsersPasswords[user][i] and hash_.lower() in kb.data.cachedUsersPasswords[user][i].lower(): - kb.data.cachedUsersPasswords[user][i] += "%s password: %s" % ('\n' if kb.data.cachedUsersPasswords[user][i][-1] != '\n' else '', password) + kb.data.cachedUsersPasswords[user][i] += "%s clear-text password: %s" % ('\n' if kb.data.cachedUsersPasswords[user][i][-1] != '\n' else '', password) else: warnMsg = "unknown hash format. "