|
NAMEpwned-check —
Check word against list of known stolen passwords.
SYNOPSIS
DESCRIPTIONThepwned-check utility checks the passwords piped in
via standard input (one per line) against a huge database of passwords that
are known to have been stolen in data breaches.
SHA1 hashes of these passwords have been published at https://haveibeenpwned.com/ If any of the checked passwords is found in the database, it is
printed on standard output and the exit status of
The database can be downloaded to a local directory or it can be queried by a method that does not make the hash queried known to the remote server. The remote query is performed if the pawned password database has not been fetched and stored on the local system. While the remote accesses are not as fast as a local lookup, they will query an always up-to-date database and allow to avoid the download and storage of this huge database. Instead of plain passwords, SHA1 hashes of passwords may be supplied. Matches will be reported, but there is no provision to report the plain text password corresponding to a given SHA1 hash. If the option FILES
EXIT STATUSpwned-check returns 0 if none of the passwords to check
have been found in the pwned password database, else 1.
If the EXAMPLESDownload the pwned password hash files:pwned-check -u Check passwords passed on standard input against pwned password database: echo badpasswd | pwned-check
Visit the GSP FreeBSD Man Page Interface. |