Oliver, a grey-hat hacker, focuses on a web application with inherent design flaws in its authentication mechanism. He systematically extracts usernames from the login form of the web application, where users are prompted to enter data, and the system explicitly identifies the incorrect field in the event of invalid credentials. Subsequently, Oliver employs this gathered information to engage in social engineering. Which of the following design flaws in the authentication mechanism is manipulated by Oliver?