Nerdy leaked passwords:

Treebeard - “This password has been seen 1,207 times before in data breaches!”

NedStark - 20 times

CerseiLannister - 30 times

youknownothingjonsnow - 61 times

PicardIsSexy - 0 times (!The_Picard_Maneuver@piefed.world you’re safe. ;)

edit:

Gandalf1 - 53,478

Gandalfthewhite - 51

sexygandalf - 6


NSFW leaked passwords:

spoiler

bigdick - 178,712 (!?!)

bigpussy - 9,226

longpussy - 26

longdick - 10,762

wetpussy - 61,575

wetdick - 579

twat - 6,588

dickhead - 201,942

Blueballs69 - 520


Weird leaked passwords:

BillClinton - 378

DonaldTrump123 - 792

youwillneverguessmypassword - 390

redgreenblue - 2,040

123qweasdzxc - 1,010,515

poopstick - 6,845

((More to come later))

  • Reygle@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    15 hours ago

    They’re missing a real opportunity here- when someone enters the “password” 12345, which 31,033,620 times by the way, their page should immediately display this

  • Darkassassin07@lemmy.ca
    link
    fedilink
    English
    arrow-up
    86
    ·
    edit-2
    2 days ago

    For those worried about inputting a password into a tool like this, they’ve actually done a great job keeping your pass secure.

    Passwords entered on this site do not get transmitted to the server. Instead, they are hashed, then only the first half of the hash is sent to the server. The server replies with a list of every password hash they’ve found in leaks that match the partial hash you sent them. Your computer then looks through the list and tells you if the password you entered (which was kept on your pc, not transmitted) exists in that list.

    From Haveibeenpwneds perspective; they sent you a big list of potential matches, but don’t know which one if any actually matches your password, because they were never given the full hash, let alone the raw password.

    There’s even an open-source script you can run that does this within a console instead of a browser. Or, you can download their whole password DB via their github tools, then check it entirely offline.

    • Kazumara@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      5
      ·
      22 hours ago

      Alternatively just hash your password with SHA-1 or NTLM and put the first 5 character of the hash into this link: https://api.pwnedpasswords.com/range/{first-5-hash-chars} then check the results for the rest of the characters of your hash.

      Example flow:

      Your password: 1234
      Run echo -n "1234" | sha1sum | awk '{ print toupper($0) }' or some other method to locally generate the SHA-1 hash
      Resulting SHA-1 Hash: 7110EDA4D09E062AA5E4A390B0A572AC0D2C0220
      Split off 5: 7110E - DA4D09E062AA5E4A390B0A572AC0D2C0220
      Open Link https://api.pwnedpasswords.com/range/7110E
      Search for DA4D09E062AA5E4A390B0A572AC0D2C0220
      Find: DA4D09E062AA5E4A390B0A572AC0D2C0220:30272674
      So this password appears a bit over 30 million times in the breach data he has.

      All Troy gets from you, if you do this, is the first 5 characters of your hash, which is pretty useless.

    • thejml@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      2 days ago

      So, a malicious JavaScript library update then…

      The open-source local script might be better, I’ll have to check into that!

      • Darkassassin07@lemmy.ca
        link
        fedilink
        English
        arrow-up
        19
        ·
        2 days ago

        You could say the same about every password entry field; but that’s why there are local/alternative options here.

    • 𝔗𝚎𝚑 𝔅𝚊𝚖𝚜𝚔𝚒@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 day ago

      I felt about the same way when I tested for that. hahaha.

      Try some keyboard walking combos. You’ll start see why so many people in I.T. are bald at early ages, starting to have grey hair before they hit 50, etc. lol

      Examples: qwer ., asdf , zxcv , qweasdzxc

  • hansolo@lemmy.today
    link
    fedilink
    English
    arrow-up
    16
    ·
    2 days ago

    For anyone reasonably concerned about the obvious boneheaded move of checking your email and then entering your password, here’s some options:

    • Don’t check them at the same time or on the same device. Use wifi and a laptop to check your email. 20 minutes later on your phone and 5G, check your password. Two different IP addresses and browser fingerprints.

    • Use Tor

    • Change VPN locations and browsers on the same device.

    • Don’t just check your password and close the page. Check 10 made up BS passwords and throw yours in the middle.

    This is all on top of the fact that HaveIBeenPwned has been a beacon of sanity for more then a decade. Troy Hunt remains huge in the cybersecurity research space, and diligently combs over data leaks. This site was one of Gizmodo’s 100 sites that shaped the internet in 2018, and remains the most accessible database of leaked credentials there is, without actually giving away the credentials.

    Now go check yourself before someone else wrecks yourself.

  • LordKitsuna@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 days ago

    This functionality is built-in to bitwarden, they can safely check your entire vault for known breaches

  • northernlights@lemmy.today
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 days ago

    TIL that besides offering a password compromise checking service, they also offer a compromised email checking service!