<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>p0wn &#8211; SystemTechnics</title>
	<atom:link href="https://www.systemtechnics.de/tag/p0wn/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.systemtechnics.de</link>
	<description>IT Consulting</description>
	<lastBuildDate>Mon, 25 Jan 2016 17:59:17 +0000</lastBuildDate>
	<language>de</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.systemtechnics.de/wp-content/uploads/cropped-2003-logo-st-transparanet-x200-32x32.png</url>
	<title>p0wn &#8211; SystemTechnics</title>
	<link>https://www.systemtechnics.de</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Benutzername gehackt?</title>
		<link>https://www.systemtechnics.de/benutzername-gehackt/</link>
		
		<dc:creator><![CDATA[knut]]></dc:creator>
		<pubDate>Mon, 30 Nov 2015 18:19:45 +0000</pubDate>
				<category><![CDATA[Allgemein]]></category>
		<category><![CDATA[Bash]]></category>
		<category><![CDATA[Linux/OSX]]></category>
		<category><![CDATA[bash]]></category>
		<category><![CDATA[p0wn]]></category>
		<category><![CDATA[passwort]]></category>
		<guid isPermaLink="false">http://www.systemtechnics.de/?p=944</guid>

					<description><![CDATA[Es sind schon einige namenhafte Websites gehackt und Benutzernamen nebst Passwörter entwendet worden. Über die Webseite https://haveibeenpwned.com kann man testen [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Es sind schon einige namenhafte Websites gehackt und Benutzernamen nebst Passwörter entwendet worden. Über die Webseite <a href="https://haveibeenpwned.com" target="_new">https://haveibeenpwned.com</a> kann man testen ob der eigene Benutzername schon &#8222;veröffentlicht&#8220; bzw. auf kursierenden Listen gefunden wurde.</p>
<p><span id="more-944"></span></p>
<p><img fetchpriority="high" decoding="async" src="/wp-content/uploads/powned-1024x757.png" alt="powned" width="1024" height="757"  /></p>
<p>Folgendes Bash-Script zeigt wie man sehr einfach deren <a href="https://haveibeenpwned.com/API/v2" target="_blank">API</a> nutzen kann um regelmäßig die eigene Maiadresse zu überprüfen:</p>
<pre><code>#!/usr/bin/env bash 


echo  "Please enter email address to check against https://haveibeenpwned.com"

read choice
response=$(curl --write-out %{http_code} --silent --output /dev/null "https://haveibeenpwned.com/api/breachedaccount/$choice")

if [ "$response" = "404" ];then
    echo "Congralaution!!You are safe "

elif [ "$response" = "400" ];then
    echo "Upps.Something went wrong." 
 
  
else
    temp=$(curl --silent --request GET "https://haveibeenpwned.com/api/breachedaccount/$choice")
    echo  "You have been pwned in "$temp" breach "
    echo  "Do you require further Details?(y/n)"
    read ans
    if [ "$ans" = "y" ] || [ "$ans" = "Y" ] ;then
	curl --silent --request GET "https://haveibeenpwned.com/api/v2/breachedaccount/$choice"|python -mjson.tool > $choice.txt
	cat $choice.txt|sed -e 's!http\(s\)\{0,1\}://[^[:space:]]*!!g' -e 's/[@#\$%^&*()=039"]//g' -e 's/< \/td>//g' -e 's/<em>//g' -e 's/< \/em>//g' -e 's/<a //g'  -e 's/<\/a>//g'  >  Breach_$choice.txt
	cat Breach_$choice.txt
	rm $choice.txt

	echo "Output saved it into Breach_$choice.txt file"
    fi

    if [ "$ans" = "n" ] || [ "$ans" = "N" ] ;then 	
	exit 1
    fi
	    
fi
</a></em></code></pre>
<p>Möchte man evtl. mit einer Liste von Mailadressen die <a href="https://haveibeenpwned.com/API/v2" target="_blank">API</a> &#8222;füttern&#8220;, so kann man folgendes Script verwenden:</p>
<pre><code>#!/usr/bin/env bash

[ $# -eq 0 ] && { echo "Usage: ./$0 emaillist"; exit 1; }

if [ "$1" == "-h" ]; then
  echo "Usage: ./$0 emaillist"
  exit 1

fi

dos2unix -q $1
sed '/^$/d'  $1 | while read choice
do
response=$(curl --write-out %{http_code} --silent --output /dev/null "https://haveibeenpwned.com/api/breachedaccount/$choice")

if [ "$response" = "404" ];then
echo "Congo. $choice is safe "

elif [ "$response" = "400" ];then
echo "Upps...Something went wrong."
 
  
else
temp=$(curl --silent --request GET "https://haveibeenpwned.com/api/breachedaccount/$choice")
    echo "$choice has been pwned in "$temp" breach "
    echo "$choice	$temp" >> out.csv	
    
fi
done
echo "Output saved into out.csv(Tab seprated)file"
</code></pre>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
