Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mubix/local-hibp
How to set up a local copy of Have-I-Been-Pwned's password checking service
https://github.com/mubix/local-hibp
Last synced: 24 days ago
JSON representation
How to set up a local copy of Have-I-Been-Pwned's password checking service
- Host: GitHub
- URL: https://github.com/mubix/local-hibp
- Owner: mubix
- License: bsd-3-clause
- Created: 2021-08-19T12:52:24.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-08-19T14:03:49.000Z (over 3 years ago)
- Last Synced: 2024-12-21T02:55:07.872Z (25 days ago)
- Language: Ruby
- Homepage:
- Size: 16.6 KB
- Stars: 19
- Watchers: 2
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - mubix/local-hibp - How to set up a local copy of Have-I-Been-Pwned's password checking service (Ruby)
README
# Local Have-I-Been-Pwned
How to set up a local copy of Have-I-Been-Pwned's password checking service- Step 1: Follow the steps here: https://gist.github.com/simbo1905/1ea8eacdfccafd3e666ebcdc0637eb41 and just in case that ever disappears you can use [the local copy](simbo1905-gist.md)
- **Word of warning, this takes about 6-7 hours to load and takes ~70gb of space (27 for the file, 35ish for the Redis database, you can delete the file afterwards)**
- Step 2: Check your passwords list against the Redis database you now have using [this script](check-localhibp.rb) `ruby check-localhibp.rb | tee -a hibp_check.log`In order to get a `pass.txt` you can use any dictionary or you can pull it out of Hashcat.
You can do it one of two ways based on what data you want. IF you want to know just what bad passwords exist in the domain you can do it this way:
- Step 1: `hashcat.exe -m1000 demodomain.ntds --show > cracked.txt`
- Step 2: Then use [convert-hashcat-pass.rb](convert-hashcat-pass.rb) `ruby convert-hashcat-pass.rb > pass.txt`Or if you want to get a sense of how many users in the domain has passwords in the HIB
- Step 1: `hashcat.exe -m1000 demodomain.ntds --show --username > cracked_with_users.txt`
- Step 1a: Make sure your list doesn't have any lines with extra colons in them: `sed 's/[^:]//g' cracked_with_users.txt | awk '{print length }' | sort -u` (this should result in 2 and 0 (for any empty lines. If you have ones with extra colons something went wrong)
- Step 2: Run [check-localhibp-users.rb](check-localhibp-users.rb) `ruby check-localhibp-users.rb | tee -a hibp_check.log`