All Projects → CboeSecurity → Password_pwncheck

CboeSecurity / Password_pwncheck

Licence: mit
Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules

Programming Languages

python
139335 projects - #7 most used programming language
c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Password pwncheck

Pw Pwnage Cfworker
Deploy a Cloudflare Worker to sanely score users' new passwords with zxcvbn AND check for matches against haveibeenpwned's 7.8+ billion breached accounts
Stars: ✭ 125 (-17.76%)
Mutual labels:  password-strength, haveibeenpwned
Haveibeenpwned Zxcvbn Lambda Api
Deploy your own secure API to estimate password strength and check haveibeenpwned for known matches - HTTPS by force, server not required, fire and brimstone sold separately 🔥
Stars: ✭ 57 (-62.5%)
Mutual labels:  password-strength, haveibeenpwned
keepassxc-pwned
Check your keepassxc database against previously breached haveibeenpwned passwords
Stars: ✭ 25 (-83.55%)
Mutual labels:  password-strength, haveibeenpwned
Socialpwned
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-31.58%)
Mutual labels:  haveibeenpwned
Android Complexify
An Android library which makes checking the quality of user's password a breeze.
Stars: ✭ 111 (-26.97%)
Mutual labels:  password-strength
Passpwn
See if your passwords in pass has been breached.
Stars: ✭ 130 (-14.47%)
Mutual labels:  haveibeenpwned
Minimalistic Offensive Security Tools
A repository of tools for pentesting of restricted and isolated environments.
Stars: ✭ 135 (-11.18%)
Mutual labels:  active-directory
Hibp
A composer package to verify if a password was previously used in a breach using Have I Been Pwned API.
Stars: ✭ 126 (-17.11%)
Mutual labels:  haveibeenpwned
Dllpasswordfilterimplant
DLL Password Filter Implant with Exfiltration Capabilities
Stars: ✭ 107 (-29.61%)
Mutual labels:  active-directory
Passwordstrengthbundle
Symfony Password strength and blacklisting validator bundle
Stars: ✭ 123 (-19.08%)
Mutual labels:  password-strength
Bonobo Git Server
Bonobo Git Server for Windows is a web application you can install on your IIS and easily manage and connect to your git repositories. Go to homepage for release and more info.
Stars: ✭ 1,693 (+1013.82%)
Mutual labels:  active-directory
Actionpacks
Public PowerShell script gallery for ScriptRunner.
Stars: ✭ 118 (-22.37%)
Mutual labels:  active-directory
Psadhealth
A toolkit of AD specific health checks that you can run in your environment to ensure your Active Directory is running optimally.
Stars: ✭ 114 (-25%)
Mutual labels:  active-directory
H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1323.03%)
Mutual labels:  haveibeenpwned
Zxcvbn Rs
Port of Dropbox's zxcvbn password strength library for Rust
Stars: ✭ 110 (-27.63%)
Mutual labels:  password-strength
Adsearch
A tool to help query AD via the LDAP protocol
Stars: ✭ 137 (-9.87%)
Mutual labels:  active-directory
Navajo Swift
Password Validator & Strength Evaluator
Stars: ✭ 106 (-30.26%)
Mutual labels:  password-strength
Adfs2
Multi Vagrant environment with Active Directory
Stars: ✭ 117 (-23.03%)
Mutual labels:  active-directory
Breach.tw
A service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
Stars: ✭ 144 (-5.26%)
Mutual labels:  haveibeenpwned
Ldap Passwd Webui
Very simple web interface for changing password stored in LDAP or Active Directory (Samba 4 AD).
Stars: ✭ 150 (-1.32%)
Mutual labels:  active-directory

password_pwncheck

Enterprise Password Quality Checking using any hash data sources (HaveIBeenPwned lists, et al)

The purpose of this project is to help companies maintain a stronger password policy without having to jump through too many hoops. Currently, we support NIST 800-63B features such as testing the password against a long minimum length (default of 15), not matching prev ious passwords (or similar entries), and most important- the password can't belong to a breach list.

The project consists of two parts:

  • A password server - This is currently a fairly simple and easy to extend python script that contains all the logic for testing passwords.
  • A password plugin client - There is work in the pipe for a Windows Password Filter DLL, a Kerberos module, and a PAM module. This should satisfy most modern enterprise extensible password management solutions. If you find this doesn't support you, than feel free to code and request a pull into the main project.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Installation

This code is very fresh- it is functional and has been tested to work, but the installation and configuration will require some level of knowledge of configuring variable values in scripts and know-how on how Kerberos/PAM/AD perform password change management. This is mainly because I make no claims that I am a technical writer, so I may be covering configuration in broad strokes...

(Under Construction)

Password Server

  • The password server needs to have downloaded password hash lists provided to it. These should sit in the ./db folder. A great place to start for your breached passwords is [https://haveibeenpwned.com/Passwords], Thanks to Troy Hunt for all his efforts (he is in large part the inspiration behind this project).
  • Also, make sure you have a valid key/certificate chain. These two files should have their paths matched with the SSLCertFile and SSLKeyFile variables.
  • The code was originally written in python 2.7, though now should work in python 3 and might work in python 2.7. You should be able to run it via python-2.7 ./pwned-password-server.py

AD Password filter DLL

  • From a Dev Studio command line, run resbuilder.bat from its directory in the ad-password-pwncheck project
  • Build the solution, specifically the ad_password_pwncheck project.
  • Copy the resulting ad_password_pwncheck.dll into the %windir%\system32 folder on all domain controllers in the domain.
  • Run wevtutil im Resources.man /rf:"%windir%\system32\ad_password_pwncheck.dll" /mf:"%windir%\system32\ad_password_pwncheck.dll" to properly register windows event logs
  • Run the included registry file to enable registry settings

Kerberos filter Shared Object

  • Run the ./build.sh too, make sure openssl-devel and curl-devel modules are loaded in your SLES/RedHat/Debian derived distribution.
  • Copy the /lib/security/krb_password_pwncheck.so library to the kerberos plugins/pwqual folder.
  • Configure the krb5.conf to have the correct path:
[plugins]
    pwqual = {
      module = pwncheck:pwqual/pwncheck.so 
    }

PAM Password filter Shared Object

  • Run the ./build.sh too, make sure openssl-devel and curl-devel modules are loaded in your SLES/Redhat/Debian derived distribution.
  • Copy the /lib/security/pwncheck.so library to the PAM folder (typically /lib/security) if it isn't there already.
  • Configure /etc/pam.d/ files that use "password" module to load the pam_pwncheck.so module first, in a way similar to:
password	requisite			pam_pwncheck.so url=https://<password server domain>/checkpwd?u=%s&p=%s
password	[success=1 default=ignore]	pam_unix.so obscure sha512 use_authtok

(note the pam_unix setting here is a pre-existing entry)

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].