Beer Challenge Results: Shortest Code for Password Analysis

by Jun 28, 2019

At psconf.eu there was recently a challenge for the shortest code to check for how often a password was previously pwnd (hacked). Here is the result (credits to Daniel Rothgänger):

[Net.ServicePointManager]::SecurityProtocol='Tls12'
'P@ssw0rd'|sc p -N$a,$b=(FileHash p -A SHA1|% h*)-split'(?<=^.{5})'((irm api.pwnedpasswords.com/range/$a)-split"$b`:(\d+)")[1]  

You can either use this chunk of code as brain jogging to find out what it does, or simply use it: it takes a password (i.e. “P@ssw0rd” in our example) and returns a number. The number is how often this particular password has been seen in previous attacks. Any password that has been seen is considered insecure. Only passwords that do not return a number are safe.


Twitter This Tip! ReTweet this Tip!