Skip to content

PowerShell based parser for HaveIBeenPwned.com JSON reports

Notifications You must be signed in to change notification settings

nterl0k/HIBP-Parser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

HIBP Parser

PowerShell based parser for HaveIBeenPwned.com JSON reports.

HIBPParser

Feed it a JSON Domain Report from "Have I Been Pwned", pretty simple. This requires signing up for domain monitoring through Have I Been Pwned. This can be done at the following link.

https://haveibeenpwned.com/DomainSearch

The following variables in the script should be tailored to the environment to ensure that the email function works correctly:

  • $EmailT = "securityteam@company.org"
  • $EmailF = "Security Teamsecurity@company.org"
  • $EmailSub = "Security Action: Breach Reporting"
  • $EmailSvr = "smtp.company.org"
  • $SecurityTeamName = "Security Team"
  • $CompanyName = "My Company"

Download JSON report

Use the following command to start the process.

New-HaveIBeenPwndParse.ps1 -JSONURL "link here"

HIBPParser2

Main Menu

Main menu has 3 basic options.

  • Serach for a specific breach data.
  • Search for specific paste data.
  • Search for one or more uaers in the breach/paste data.

All options will check AD if the user is a valid account based on email to AD filtering. It will then check the breach data date to see if the AD account may be in danger of password guessing.

HIBPParser3

Report Output

Each report option will allow for multiple output formats:

  • Display on screen (shown below).
  • Export a CSV to desktop
  • Email report. Includes minor verbiage and CSV attached
    • Also includes the default distro in the script config but will allow for other targets as well.

HIBPParser1

About

PowerShell based parser for HaveIBeenPwned.com JSON reports

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published