如何使用pwned检测自己是否已被渗透或数据泄露

2024-08-13 198 0

关于pwned

pwned是一款功能强大的网络安全检测工具,该工具基于命令行实现,可以帮助广大安全研究人员检测自己的设备系统是否已被渗透,或发生了数据泄露。

工具要求

Node.js

工具安装

由于该工具基于Node.js开发,因此我们首先需要在本地设备上安装并配置好最新版本的Node.js环境。

源码安装

接下来,广大研究人员可以直接使用下列命令将该项目源码克隆至本地:

git clone https://github.com/wKovacs64/pwned.git

NPM安装

下载并安装Node.js,然后可以使用npm以及以下命令全局安装pwned:

npm install pwned -g

然后就可以直接使用npx运行pwned了:

npx pwned

注意事项

为了使用某些pwned命令(例如ba、pa和search),则需要获取 API 密钥并运行下列命令配置pwned:

pwned apiKey

其他命令不需要 API 密钥,我们可以在不获取密钥的情况下使用它们。

工具使用

pwned <command>

 

Commands:

  pwned apiKey [key]            设置要用于经过身份验证的请求的API密钥

  pwned ba <account|email>     获取帐户(用户名或电子邮件地址)的所有数据泄露

pwned breach <name>         获取单个数据泄露站点

  pwned breaches               获取所有的数据泄露信息

  pwned dc                    获取系统中所有的数据类

  pwned pa <email>              获取账户(电子邮件)中的所有数据

  pwned pw <password>          检查密码是否被曝光

  pwned search <account|email>  搜索电子邮件或账号泄露信息

  pwned subStatus               取API密钥的订阅状态

 

Options:

  -h, --help    显示工具帮助信息

  -v, --version 显示工具版本

工具运行演示

获取账户的所有数据泄露情况:

$ pwned ba [email protected]

 Good news — no pwnage found!

获取系统中的所有漏洞,并将结果过滤(仅“adobe.com”域):

$ pwned breaches -d adobe.com

-

  Title:        Adobe

  Name:         Adobe

  Domain:       adobe.com

  BreachDate:   2013-10-04

  AddedDate:    2013-12-04T00:00:00Z

  ModifiedDate: 2013-12-04T00:00:00Z

  PwnCount:     152445165

  Description:  In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, <em>encrypted</em> password and a password hint in plain text. The password cryptography was poorly done and <a href="http://stricture-group.com/files/adobe-top100.txt" target="_blank" rel="noopener">many were quickly resolved back to plain text</a>. The unencrypted hints also <a href="http://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html" target="_blank" rel="noopener">disclosed much about the passwords</a> adding further to the risk that hundreds of millions of Adobe customers already faced.

  DataClasses:

    - Email addresses

    - Password hints

    - Passwords

    - Usernames

  IsVerified:   true

  IsFabricated: false

  IsSensitive:  false

  IsActive:     true

  IsRetired:    false

  IsSpamList:   false

  LogoType:     svg

根据泄漏信息查询站点:

$ pwned breach MyCompany

 No breach found by that name.

获取系统中的所有数据类,返回原始 JSON 结果以供外部/链式使用:

$ pwned dc --raw

["Account balances","Address book contacts","Age groups","Ages","Apps installed on devices","Astrological signs","Auth tokens","Avatars","Bank account numbers","Banking PINs","Beauty ratings","Biometric data","Browser user agent details","Buying preferences","Car ownership statuses","Career levels","Cellular network names","Charitable donations","Chat logs","Credit card CVV","Credit cards","Credit status information","Customer feedback","Customer interactions","Dates of birth","Deceased date","Deceased statuses","Device information","Device usage tracking data","Drinking habits","Drug habits","Eating habits","Education levels","Email addresses","Email messages","Employers","Ethnicities","Family members' names","Family plans","Family structure","Financial investments","Financial transactions","Fitness levels","Genders","Geographic locations","Government issued IDs","Health insurance information","Historical passwords","Home ownership statuses","Homepage URLs","IMEI numbers","IMSI numbers","Income levels","Instant messenger identities","IP addresses","Job titles","MAC addresses","Marital statuses","Names","Nationalities","Net worths","Nicknames","Occupations","Parenting plans","Partial credit card data","Passport numbers","Password hints","Passwords","Payment histories","Payment methods","Personal descriptions","Personal health data","Personal interests","Phone numbers","Physical addresses","Physical attributes","Political donations","Political views","Private messages","Professional skills","Profile photos","Purchases","Purchasing habits","Races","Recovery email addresses","Relationship statuses","Religions","Reward program balances","Salutations","School grades (class levels)","Security questions and answers","Sexual fetishes","Sexual orientations","Smoking habits","SMS messages","Social connections","Social media profiles","Spoken languages","Support tickets","Survey results","Time zones","Travel habits","User statuses","User website URLs","Usernames","Utility bills","Vehicle details","Website activity","Work habits","Years of birth","Years of professional experience"]

获取某个电子邮件地址的所有粘贴内容:

$ pwned pa [email protected]

-

  Source:     Pastebin

  Id:         YrpQA60S

  Title:      null

  Date:       2018-01-24T07:54:15Z

  EmailCount: 16476

-

  Source:     Pastebin

  Id:         suPshHZ1

  Title:      null

  Date:       2017-09-06T03:41:33Z

  EmailCount: 20444

-

  Source:     Pastebin

  Id:         xyb8vavK

  Title:      null

  Date:       2015-06-01T00:16:46Z

  EmailCount: 8

-

  Source:     Pastebin

  Id:         DaaFjBe

  Title:      CrackingCore - Redder04

  Date:       2015-04-05T22:22:39Z

  EmailCount: 116

-

  Source:     Pastebin

  Id:         9MAAgecd

  Title:      IPTV Yabancı Combolist

  Date:       2015-02-07T15:21:00Z

  EmailCount: 244

-

  Source:     Pastebin

  Id:         QMx1dPUT

  Title:      null

  Date:       2015-02-02T20:45:00Z

  EmailCount: 6607

-

  Source:     Pastebin

  Id:         zUFSee4n

  Title:      nethingoez

  Date:       2015-01-21T15:13:00Z

  EmailCount: 312

-

  Source:     AdHocUrl

  Id:         http://siph0n.in/exploits.php?id=4560

  Title:      BuzzMachines.com 40k+

  Date:       null

  EmailCount: 36959

-

  Source:     AdHocUrl

  Id:         http://siph0n.in/exploits.php?id=4737

  Title:      PayPalSucks Database 102k

  Date:       null

  EmailCount: 82071

-

  Source:     AdHocUrl

  Id:         http://balockae.online/files/BlackMarketReloaded_users.sql

  Title:      balockae.online

  Date:       null

  EmailCount: 10547

检查密码是否已在数据泄露中暴露:

$ pwned pw Password1234

 Oh no — pwned 3360 times!

搜索目标账号的数据泄露情况:

$ pwned search nobody

breaches:

  -

    Name: BattlefieldHeroes

  -

    Name: CannabisForum

  -

    Name: Forbes

  -

    Name: Gawker

  -

    Name: HackForums

  -

    Name: LoungeBoard

  -

    Name: PokemonCreed

  -

    Name: Win7Vista

pastes:   null

许可证协议

本项目的开发与发布遵循MIT开源许可协议。

项目地址

pwned:【GitHub传送门

参考资料

https://nodejs.org/en/download/

https://medium.com/@maybekatz/introducing-npx-an-npm-package-runner-55f7d4bd282b


4A评测 - 免责申明

本站提供的一切软件、教程和内容信息仅限用于学习和研究目的。

不得将上述内容用于商业或者非法用途,否则一切后果请用户自负。

本站信息来自网络,版权争议与本站无关。您必须在下载后的24个小时之内,从您的电脑或手机中彻底删除上述内容。

如果您喜欢该程序,请支持正版,购买注册,得到更好的正版服务。如有侵权请邮件与我们联系处理。敬请谅解!

程序来源网络,不确保不包含木马病毒等危险内容,请在确保安全的情况下或使用虚拟机使用。

侵权违规投诉邮箱:4ablog168#gmail.com(#换成@)

相关文章

办事处网络安全监控与事件响应;国外员工终端安全性怎么保障 | FB甲方群话题讨论
拿不下总统之位,那就用热加载拿下验证码识别与爆破好了!
Sooty:一款SoC分析一体化与自动化CLI工具
shiro CVE-2016-6802 路径绕过(越权)
Apache Solr 身份验证绕过漏洞(CVE-2024-45216)详解
llama_index的CVE-2024-4181漏洞根因分析

发布评论