Have I Been PWNED & How It Works

แชร์
ฝัง
  • เผยแพร่เมื่อ 24 ม.ค. 2025

ความคิดเห็น • 38

  • @abdraoufx
    @abdraoufx 6 ปีที่แล้ว +7

    My emails are pwned but none of my passwords

  • @sethwilliamson
    @sethwilliamson 6 ปีที่แล้ว +1

    Also, note that you can sign up on that website to get an email whenever your email address appears on any of the breaches he finds.

  • @HughvanZyl
    @HughvanZyl 4 ปีที่แล้ว

    your terminal looks really cool

  • @jimsragetogm-uspsa4151
    @jimsragetogm-uspsa4151 6 ปีที่แล้ว

    I have been watching your videos and I am very impressed with your thought that goes into each video. I have had a few of my customers hit with breaches and one was hit with a ransomware virus. We got it cleaned off and now safe however it was painful! Getting users to change the passwords is painful until an event happens.
    My question is (a little off topic) what do you use for customer WOL functionality? For instance a server not restaringt after a power outage.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  6 ปีที่แล้ว +1

      Use motherboard boards that have IPMI / "Lights Out functionality

    • @jimsragetogm-uspsa4151
      @jimsragetogm-uspsa4151 6 ปีที่แล้ว

      @@LAWRENCESYSTEMS I was really asking what software you use? I know you use solarwinds, however I am looking for something that will work through a firewall or I may need to place some kind of host software on a PC that will "wake" another device.

    • @1yaz
      @1yaz 6 ปีที่แล้ว

      @@jimsragetogm-uspsa4151 How would you "wake" a powered off system using WOL?
      Since you are working with servers you should take his advice and send commands to the management module(s).
      They usually have web interfaces but you could write scripts using their CLI software, e.g ASU for IBM, RACADM for Dell, etc...
      If the servers are on managed PDUs you could automate the "wake" process to be ran when a power outage is resolved.

  • @Drop-mw5re
    @Drop-mw5re ปีที่แล้ว

    can you talk about entering email address over command line for this api

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  ปีที่แล้ว

      I have never used their API for email checking.

  • @woodswannamaker5797
    @woodswannamaker5797 6 ปีที่แล้ว

    Why doesn't LastPass include the API?

  • @Tntdruid
    @Tntdruid 6 ปีที่แล้ว +4

    My old pw is on 5 list 😁☕️

    • @mysteretsym
      @mysteretsym 4 ปีที่แล้ว

      Same i change dem

  • @sofaking6642
    @sofaking6642 3 ปีที่แล้ว +1

    numbers have gone up! It's 3,861,493. People are still using password as their password

  • @yuriw777
    @yuriw777 6 ปีที่แล้ว

    So website and github project are different things ? That’s confusing

  • @ghosts33
    @ghosts33 4 ปีที่แล้ว +3

    Have I been pwned password
    *proceeds to type in password*

  • @stephenleung1752
    @stephenleung1752 6 ปีที่แล้ว +1

    No matter how it tries to prove that it is safe, it doesn't seem a bright idea to me to use such website to check passwords I've used anyways (p.s.: I've watched the video I know it uses parts of the hashes)

  • @token112
    @token112 6 ปีที่แล้ว

    As usual, great vid

  • @bryanberch1824
    @bryanberch1824 6 ปีที่แล้ว

    While I found my login name on the list for accounts not used in over 15 years, none of my passwords appeared used before. I also change passwords regularly.
    I quit using lastpass a few years ago. Mainly because I didn't like the password generator. It was always giving a capital and lowercase of the same letter in the password. I know it's not the same, but I like them all different.

  • @oleksandrlytvyn532
    @oleksandrlytvyn532 3 ปีที่แล้ว

    Thanks

  • @saladpoo
    @saladpoo 4 ปีที่แล้ว

    i had my password stolen on an online schooling account. A SCHOOLING ACCOUNT.

  • @haraldaarseth1870
    @haraldaarseth1870 6 ปีที่แล้ว

    Lastpass is not that secure

  • @judmcfeters9054
    @judmcfeters9054 6 ปีที่แล้ว

    SHA1 can’t be reverse engineered? Get your head out of 2005 and join 2019 when this vid was posted. There’s a reason no modern browser (Google, Mozilla, or Microsoft) allows SSL carts based on SHA1 since 2017. Often they won’t even allow an “advanced” option to proceed past the warnings and flat out prevent further attempts to connect. Those browsers have been warning against SHA1 certs since 2015. This IS NOT NEW! If you’re going to post Infosec information, at least attempt to be current.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  6 ปีที่แล้ว

      I said "not easily reversed" I know why it is no longer used, but SHA1 is what the site uses for comparison

    • @judmcfeters9054
      @judmcfeters9054 6 ปีที่แล้ว

      Lawrence Systems / PC Pickup- Assuming you said “not easily reverse engineered” vs “cannot be reverse engineered,” the statement is still massively wrong. It’s true that the first successful collision of SHA1 took the equivalent of 6600 years of processor time. However, with the improvements of Rainbow Tables, a successful collision can be had in approximately 5 minutes using just an ordinary computer. It doesn’t need to be a fancy nation state sponsored super computer. Even random passwords that are over 30 characters long are defeated in minutes. That’s a very easy hack. It’s for this reason that security experts have been saying since about 2012 that passwords alone are no longer viable for security.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  6 ปีที่แล้ว +1

      Once again, it was not the point of my video, I was not encouraging people to use SHA1 for security. Also if you have five minutes to crack it... :)
      d87cb14fc96359a02429eb2c7c0245a79ba2e1e7

  • @gooseduck7038
    @gooseduck7038 4 ปีที่แล้ว +1

    It wasnt funny till you find the password peepee has been pwned

  • @peterpain6625
    @peterpain6625 6 ปีที่แล้ว +1

    Ehhm... So i put a password i use/used/will use in some random website to be "checked" if it was pwned? Riiiight... If i could download the whole db to check offline then maybe. Otherwise anything entered there i'd consider burned for password ;)

    • @tordenflesk2322
      @tordenflesk2322 6 ปีที่แล้ว +3

      Please watch the video before commenting. It's using hashes.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  6 ปีที่แล้ว +1

      Watch the video! By using the bash script or doing it manually you are not sending your password.

    • @peterpain6625
      @peterpain6625 6 ปีที่แล้ว

      @@LAWRENCESYSTEMS Yeah ... should have watched to the end before typing. ***FACE->TABLE***

    • @slycordinator
      @slycordinator 6 ปีที่แล้ว

      "If i could download the whole db to check offline then maybe."
      At the link in the description, you can download a copy of the list that was uploaded/created on 17 Jan 2019. It has options for downloading over torrent and cloudflare (if torrent isn't available).
      It'll give you a a 7z compressed file that contains the list of the hashed passwords. You can choose between the list with SHA1 or NTLM hashes and each of those either ordered by prevalence or ordered by hash value.

  • @float_sam
    @float_sam 6 ปีที่แล้ว

    I hate this site. I'd prefer to enter a hashed PW, and not rely on shitty javascript with 'telemetry' hanging out where I enter a password.. obviously any password in this form you should consider already compromised.

  • @grouchyed2561
    @grouchyed2561 6 ปีที่แล้ว

    I’ve always heard it pronounced “pony’d”.

  • @torky1465
    @torky1465 3 ปีที่แล้ว

    My password is: G3T R1CR0!!3D