Check your passwords against the Pwned Passwords database - gHacks Tech News

Check your passwords against the Pwned Passwords database

Is a password that you use actively to protect an account secure? The question is difficult to answer as it depends on your definition of secure.

Secure can mean, among other things, that it cannot be cracked in reasonable time, or that it is not already on a publicly accessible password list.

Pwned Passwords

pwned passwords

The Pwned Passwords database of Have I Been Pwned has been updated recently with new password data sets.

The service accepts a password and reveals whether it was found on any of the lists that powers the service's database.

All you have to do is type a password to find out whether it is available in the clear-text format on a public password dump list.

Some users may have reservations when it comes to typing passwords that they use on a site on the Internet. That site, in theory, could use the information for malicious activity. While it requires a username, usually that goes along with it, adding the password to a list to run dictionary attacks against services could have negative consequences for the user who entered it on the site.

That's one reason why you may download the entire database to your local system. It is available as a zipped torrent file; the torrent file has a size of 8.8 Gigabytes and contains a list of 501 million password hashes and password use counts. The archive extracts to a single 30 Gigabytes large text file that many text editors won't open.

Use a free program like Large Text File Viewer to open the text document on your system.

You need to compute the SHA-1 hash of your passwords and may use a free program like HashCalc for that which supports the computation of hashes from text strings among other things.

You'd then search the downloaded database file for that Sha-1 hash to find out if the password leaked before.

Attackers may use public password lists in attacks, especially if passwords are popular.

If a password is found in the database, it is advised to change it and use a password that is not found. Generally speaking, it is best to assume that any password that is listed in the database is known to attackers and should not be used anymore.

Now You: How do you make sure to select secure passwords for accounts?

Related articles

Summary
Check your passwords against the Pwned Passwords database
Article Name
Check your passwords against the Pwned Passwords database
Description
You may use the updated Pwned Passwords database to find out whether the passwords that you use actively are on public password database lists on the Internet.
Author
Publisher
Ghacks Technology News
Logo

We need your help

Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.

We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.

If you like our content, and would like to help, please consider making a contribution:

Comments

  1. AlpoAndPurp said on February 22, 2018 at 1:12 pm
    Reply
  2. MarkCB said on February 22, 2018 at 1:18 pm
    Reply

    I’m not pasting my passwords into any site but the one I wish to log in to. However, I am grateful that this website exists to check my email for pwnage. So thanks for that.

    I use Keepass and change my passwords regularly.

    1. Wayfarer said on February 23, 2018 at 1:10 am
      Reply

      Absolutely ditto MarkCB.

      I’d love to know, but this is counter-intuitive to everything I’ve learned about security.

    2. John Fenderson said on February 23, 2018 at 6:21 pm
      Reply

      That’s a fully reasonable position (and one that I share). This service appears to be trustworthy, but nobody should expand their attack surface regardless of how trustworthy the service is if there isn’t a good reason to expand it.

      As I see it, the utility of this service is really for people who have poor password habits — namely, people who use the same password with multiple services/sites. If you are strict about never reusing passwords, then this service is of limited value.

      So my recommendation is: generate a new (and completely random) password for each site and service you use.

      If you’re unwilling to do that, then this service is actually important, so that you have an indication that you need to go change the passwords for all the other sites/services that use the same one.

  3. Charlie said on February 22, 2018 at 1:23 pm
    Reply

    Entering your password in a site like this puts your password in a list that potentially could be used for brute force attacks. Hackers are so resourceful. Instead of creating their own lists, they masquerade as a password checking facility, and get everyone else to add words to their list.

    Don’t do it.

  4. Yuliya said on February 22, 2018 at 1:35 pm
    Reply

    I tried my WLAN and router’s passwords there, I was curious.

    WLAN: Good news — no pwnage found!
    router: Oh no — pwned! This password has been seen 24 times before

    Interestingly enough, in my mind, the pass that I set for my router is stronger than the one I set for my WLAN.

    I won’t try any of my accounts passwords, even though I am aware of who Troy Hunt is. Still, interesting..

  5. Paul's Dad. said on February 22, 2018 at 1:46 pm
    Reply

    Interesting to find that my old password I used to use everywhere (terrible practice) has not been leaked :) It was a relatively unsafe password, but it wasn’t a word.

    Remember: you shouldn’t be able (or need) to remember your passwords.

  6. chump2010 said on February 22, 2018 at 1:58 pm
    Reply

    Troy Hunt the owner of this and HaveIbeenPawned, in his blog post: https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity

    does state he does not necessarily want to encourage people to plug their passwords into any third party service. I quote:

    [QUOTE]Getting back to the online search, being conscious of not wanting to send the wrong message to people, immediately before the search box I put a very clear, very bold message: “Do not send any password you actively use to a third-party service – even this one!” [/QUOTE]

    That was from the above post and was referencing version 1. However he comments further on this and partially justifies why he is doing this:

    [QUOTE]As much as I don’t want to encourage people to plug their real password(s) into random third-party sites, I can guarantee that a sizable number of people got a positive hit and then changed their security hygiene as a result. One of the biggest things that’s resonated with me in running HIBP is how much impact it’s had on changing user behaviour. Seeing either your email address or your password pwned has a way of making people reconsider some of their security decisions. [/QUOTE]

  7. Tom Hawack said on February 22, 2018 at 3:43 pm
    Reply

    “Now You: How do you make sure to select secure passwords for accounts?”

    Who, me? :) I use unique 32 characters alpha-numeric + custom passwords (32 or less if the site limits the length to <32). I don't provide a usual name for my favorite pet or mom's name but instead another 32chrs. password. Password managers nowadays are legion and the only effort is in finding the best suitable for our expectations.

    Concerning the online Pwned Passwords checking I wouldn't check (online) a password I use, but I could test new ones, just to see. After all there's only the user who knows if the password he's checking in elaborated from imagination or factual.

    1. STech said on February 25, 2018 at 10:41 pm
      Reply

      Hi
      If you have 30GB to spare on your HardDisk and you have Python installed (or you are willing to install it), you can download the DB with hashed passwords from https://downloads.pwnedpasswords.com/passwords/pwned-passwords-2.0.txt.7z and my script from https://github.com/STech-Ics/pwnedPasswordsLocal and you can check all your passwords locally, without any connection to Internet.
      The python script is not so polished, but it works fast and for lists of passwords too.
      Cheers!

      1. STech said on February 25, 2018 at 10:47 pm
        Reply

        PS: Thanks Martin for the article. Now I can demonstrate to my wife how bad she is at inventing passwords :)

  8. Tech Enlightenment said on February 22, 2018 at 8:51 pm
    Reply

    Isn’t this exactly what the Pwned Password wants in order to just grow more its database? To provide them with our passwords by checking them up?
    Heh we said long time goodbye to sincerity now did we?

  9. o_O said on February 22, 2018 at 11:00 pm
    Reply

    And don’t forget to change your password after that ;)

    1. Tom Hawack said on February 22, 2018 at 11:14 pm
      Reply

      And don’t create a same password than the one you’ve submitted for checking…

      With these conditions such a site remains valid IMO essentially in two scenarios,

      1- You’ve been hacked, was it possibly related to a password? Check it out and, whatever the answer, change it as o_O above recommends to do so;

      2- Curiosity. Submit passwords to evaluate the correlation between their build and their availability on the site’s database… but don’t use those submitted afterwards. I wouldn’t, anyway. In this regard, a good application, filled with information and various detailed password strength analysis, called “Strong Passwords Need Entropy” : excellent IMO.

  10. James T. said on February 23, 2018 at 3:50 pm
    Reply

    1Password/AgileBites uses the pwned password database

  11. John Fenderson said on February 23, 2018 at 9:23 pm
    Reply

    “How do you make sure to select secure passwords for accounts?”

    I use a password generator to generate random passwords, a different password for every login*.

    *I do cheat a little on this — with my own servers and services, I have a single “internal password” that I use to access systems that you already have to be in my VPN to get to. That password gets changed about ever 90 days, and is never used for any other purpose. It’s a compromise, to be sure, but one that I’m OK with since you must have already subverted my VPN in order for it to be useful.

  12. TelV said on February 24, 2018 at 10:19 am
    Reply

    I typed the p/w my girlfriend uses and unsurprisingly (since it’s pretty weak), it appears to have been used twice before.

    I’ll send here the link and hope the result teaches her a lesson.

    I don’t see any cause for concern for others worried about typing their own passwords on the site since it’s using a EV certificate.

    1. John Fenderson said on February 26, 2018 at 5:18 pm
      Reply

      @TelV: “I don’t see any cause for concern for others worried about typing their own passwords on the site since it’s using a EV certificate”

      While I don’t think this site is unusually risky, I did want to point out the using an EV cert should not give you a sense of security for this sort of thing. You’re still trusting that the site is handling your sensitive data properly. No cert in the world addresses that issue.

      1. TelV said on March 5, 2018 at 2:11 pm
        Reply

        Apologies for the late response John. I’m afraid I only just received notification of it.

        Anyway, the point I was trying to make with EV certificates is that to obtain one, the site owner has to comply with the more rigorous requirements to obtain one. Here’s a quote from Wikipedia on the subject:

        “EV certificates are validated against both the Baseline Requirements and the Extended Validation requirements, which place additional requirements on how authorities vet companies. These include manual checks of all the domain names requested by the applicant, checks against official government sources, checks against independent information sources, and phone calls to the company to confirm the position of the applicant. If the certificate is accepted, the government-registered serial number of the business as well as the physical address are stored in the EV certificate.”

        I trust that clarifies the matter.

  13. leanon said on February 25, 2018 at 3:24 pm
    Reply

    I keep wondering what to say to this. Seen it mentioned on a couple forum sites an thought “huh”. Im going to go somewhere else now.

Leave a Reply