@@ -224,15 +224,15 @@ def run_hashcat(self):
224224 if Configuration .skip_crack :
225225 if self .view :
226226 self .view .add_log ("Skipping crack phase (--skip-crack flag)" )
227- return self ._extracted_from_run_hashcat_44 (
227+ return self ._handle_hashcat_failure (
228228 '{+} Not cracking pmkid because {C}skip-crack{W} was used{W}' )
229229
230230 # Crack it.
231231 if Process .exists (Hashcat .dependency_name ):
232232 try :
233233 self .success = self .crack_pmkid_file (pmkid_file )
234234 except KeyboardInterrupt :
235- return self ._extracted_from_run_hashcat_44 (
235+ return self ._handle_hashcat_failure (
236236 '\n {!} {R}Failed to crack PMKID: {O}Cracking interrupted by user{W}'
237237 )
238238 else :
@@ -244,9 +244,8 @@ def run_hashcat(self):
244244
245245 return True # Even if we don't crack it, capturing a PMKID is 'successful'
246246
247- # TODO Rename this here and in `run_hashcat`
248- def _extracted_from_run_hashcat_44 (self , arg0 ):
249- Color .pl (arg0 )
247+ def _handle_hashcat_failure (self , message ):
248+ Color .pl (message )
250249 self .success = False
251250 return True
252251
@@ -481,7 +480,7 @@ def crack_pmkid_file(self, pmkid_file):
481480
482481 if key is not None :
483482 log_info ('AttackPMKID' , f'PMKID cracked successfully! Password: { key } ' )
484- return self ._extracted_from_crack_pmkid_file_31 (key , pmkid_file )
483+ return self ._handle_pmkid_crack_success (key , pmkid_file )
485484 # Failed to crack.
486485 if Configuration .wordlist is not None :
487486 log_warning ('AttackPMKID' , 'PMKID crack failed: passphrase not found in wordlist' )
@@ -492,8 +491,7 @@ def crack_pmkid_file(self, pmkid_file):
492491 '{R}Failed {O}Passphrase not found in dictionary.\n ' )
493492 return False
494493
495- # TODO Rename this here and in `crack_pmkid_file`
496- def _extracted_from_crack_pmkid_file_31 (self , key , pmkid_file ):
494+ def _handle_pmkid_crack_success (self , key , pmkid_file ):
497495 # Successfully cracked.
498496 if self .view :
499497 self .view .add_log (f"Successfully cracked PMKID!" )
@@ -615,31 +613,29 @@ def save_pmkid(self, pmkid_hash):
615613 """Saves a copy of the pmkid (handshake) to hs/ directory."""
616614 # Create handshake dir
617615 if self .do_airCRACK :
618- return self ._extracted_from_save_pmkid_6 (pmkid_hash )
616+ return self ._copy_pmkid_to_file (pmkid_hash )
619617 if not os .path .exists (Configuration .wpa_handshake_dir ):
620618 os .makedirs (Configuration .wpa_handshake_dir )
621619
622- pmkid_file = self ._extracted_from_save_pmkid_21 ('.22000' )
620+ pmkid_file = self ._generate_pmkid_filepath ('.22000' )
623621 with open (pmkid_file , 'w' ) as pmkid_handle :
624622 pmkid_handle .write (pmkid_hash )
625623 pmkid_handle .write ('\n ' )
626624
627625 return pmkid_file
628626
629- # TODO Rename this here and in `save_pmkid`
630- def _extracted_from_save_pmkid_21 (self , arg0 ):
627+ def _generate_pmkid_filepath (self , extension ):
631628 # Generate filesystem-safe filename from bssid, essid and date
632629 essid_safe = re .sub ('[^a-zA-Z0-9]' , '' , self .target .essid )
633630 bssid_safe = self .target .bssid .replace (':' , '-' )
634631 date = time .strftime ('%Y-%m-%dT%H-%M-%S' )
635- result = f'pmkid_{ essid_safe } _{ bssid_safe } _{ date } { arg0 } '
632+ result = f'pmkid_{ essid_safe } _{ bssid_safe } _{ date } { extension } '
636633 result = os .path .join (Configuration .wpa_handshake_dir , result )
637634
638635 Color .p ('\n {+} Saving copy of {C}PMKID Hash{W} to {C}%s{W} ' % result )
639636 return result
640637
641- # TODO Rename this here and in `save_pmkid`
642- def _extracted_from_save_pmkid_6 (self , pmkid_hash ):
643- pmkid_file = self ._extracted_from_save_pmkid_21 ('.cap' )
638+ def _copy_pmkid_to_file (self , pmkid_hash ):
639+ pmkid_file = self ._generate_pmkid_filepath ('.cap' )
644640 copy (pmkid_hash , pmkid_file )
645641 return pmkid_file
0 commit comments