Downloads:

74

Downloads of v 1.3.6:

74

Last Update:

18 Jul 2020

Package Maintainer(s):

Software Author(s):

  • Andrew Schofield

Tags:

keepass plugin password hacked

KeePass Plugin Have I Been Pwned

1.3.6 | Updated: 18 Jul 2020

Downloads:

74

Downloads of v 1.3.6:

74

Maintainer(s):

Software Author(s):

  • Andrew Schofield

KeePass Plugin Have I Been Pwned 1.3.6

All Checks are Passing

2 Passing Test


Validation Testing Passed


Verification Testing Passed

Details

To install KeePass Plugin Have I Been Pwned, run the following command from the command line or from PowerShell:

>

To upgrade KeePass Plugin Have I Been Pwned, run the following command from the command line or from PowerShell:

>

To uninstall KeePass Plugin Have I Been Pwned, run the following command from the command line or from PowerShell:

>

NOTE: This applies to both open source and commercial editions of Chocolatey.

1. Ensure you are set for organizational deployment

Please see the organizational deployment guide

  • Open Source or Commercial:
    • Proxy Repository - Create a proxy nuget repository on Nexus, Artifactory Pro, or a proxy Chocolatey repository on ProGet. Point your upstream to https://chocolatey.org/api/v2. Packages cache on first access automatically. Make sure your choco clients are using your proxy repository as a source and NOT the default community repository. See source command for more information.
    • You can also just download the package and push it to a repository Download

3. Enter your internal repository url

(this should look similar to https://chocolatey.org/api/v2)

4. Choose your deployment method:


choco upgrade keepass-plugin-haveibeenpwned -y --source="'STEP 3 URL'" [other options]

See options you can pass to upgrade.

See best practices for scripting.

Add this to a PowerShell script or use a Batch script with tools and in places where you are calling directly to Chocolatey. If you are integrating, keep in mind enhanced exit codes.

If you do use a PowerShell script, use the following to ensure bad exit codes are shown as failures:


choco upgrade keepass-plugin-haveibeenpwned -y --source="'STEP 3 URL'"
$exitCode = $LASTEXITCODE

Write-Verbose "Exit code was $exitCode"
$validExitCodes = @(0, 1605, 1614, 1641, 3010)
if ($validExitCodes -contains $exitCode) {
  Exit 0
}

Exit $exitCode

- name: Ensure keepass-plugin-haveibeenpwned installed
  win_chocolatey:
    name: keepass-plugin-haveibeenpwned
    state: present
    version: 1.3.6
    source: STEP 3 URL

See docs at https://docs.ansible.com/ansible/latest/modules/win_chocolatey_module.html.

Coming early 2020! Central Managment Reporting available now! More information...


chocolatey_package 'keepass-plugin-haveibeenpwned' do
  action    :install
  version  '1.3.6'
  source   'STEP 3 URL'
end

See docs at https://docs.chef.io/resource_chocolatey_package.html.


Chocolatey::Ensure-Package
(
    Name: keepass-plugin-haveibeenpwned,
    Version: 1.3.6,
    Source: STEP 3 URL
);

Requires Otter Chocolatey Extension. See docs at https://inedo.com/den/otter/chocolatey.


cChocoPackageInstaller keepass-plugin-haveibeenpwned
{
   Name     = 'keepass-plugin-haveibeenpwned'
   Ensure   = 'Present'
   Version  = '1.3.6'
   Source   = 'STEP 3 URL'
}

Requires cChoco DSC Resource. See docs at https://github.com/chocolatey/cChoco.


package { 'keepass-plugin-haveibeenpwned':
  provider => 'chocolatey',
  ensure   => '1.3.6',
  source   => 'STEP 3 URL',
}

Requires Puppet Chocolatey Provider module. See docs at https://forge.puppet.com/puppetlabs/chocolatey.


salt '*' chocolatey.install keepass-plugin-haveibeenpwned version="1.3.6" source="STEP 3 URL"

See docs at https://docs.saltstack.com/en/latest/ref/modules/all/salt.modules.chocolatey.html.

5. If applicable - Chocolatey configuration/installation

See infrastructure management matrix for Chocolatey configuration elements and examples.

This package was approved by moderator mwallner on 21 Jul 2020.

Description

KeePass 2.x plugin to check all entries with URLs against various breach lists.

Currently Supported Breach Lists

Site/Domain based

  • Have I Been Pwned (HIBP) - Checks the domains of any entries against the Have I Been Pwned? list curated by Troy Hunt.
  • Cloudbleed vulnerability list - Checks the domains of any entries that appear in the Cloudbleed vulnerability list. This has potential to produce false positives due to the way this list was produced.

Username based

  • Have I Been Pwned (HIBP) - Checks the usernames of any entries against the Have I Been Pwned? list curated by (Troy Hunt)[https://www.troyhunt.com/]. This service requires you to register for an API key via https://haveibeenpwned.com/API/Key . The cost of API key is $3.50 per month (Credit card required).

Password based

  • Have I Been Pwned (HIBP) - Checks the passwords of any entries against the Have I Been Pwned? list curated by Troy Hunt.

This checker sends a small portion of the password hash to HIBP and then checks the full hash locally against the list of hashes returned by HIBP. This service does not send your password, nor enough of the hash to expose your password to HIBP.

NOTE: This is an automatically updated package. If you find it is out of date by more than a week, please contact the maintainer(s) and let them know the package is no longer updating correctly.


tools\.skipAutoUninstaller
 
tools\chocolateyInstall.ps1
$ErrorActionPreference = 'Stop'

$toolsDir = Split-Path -parent $MyInvocation.MyCommand.Definition
$installLog = Join-Path -Path $toolsDir -ChildPath ("{0}-install.log" -f $env:ChocolateyPackageName)
$pluginName = 'HaveIBeenPwned.plgx'

$packageSearch = 'KeePass Password Safe*'
$installPath = ''

Write-Verbose "Searching for Keepass install location."
if ([array]$key = Get-UninstallRegistryKey -SoftwareName $packageSearch) {
    $installPath = $key.InstallLocation
}

if ([string]::IsNullOrEmpty($installPath)) {
    Write-Verbose "Searching '$env:ChocolateyBinRoot' for portable install..."
    $portPath = Join-Path -Path $env:ChocolateyBinRoot -ChildPath "keepass"
    $installPath = Get-ChildItem -Directory "$portPath*" -ErrorAction SilentlyContinue
}

if ([string]::IsNullOrEmpty($installPath)) {
    Write-Verbose "Searching '$env:Path' for unregistered install..."
    $installFullName = Get-Command -Name keepass -ErrorAction SilentlyContinue
    if ($installFullName) {
        $installPath = Split-Path $installFullName.Path -Parent
    }
}

if ([string]::IsNullOrEmpty($installPath)) {
    throw "$($packageSearch) not found."
}
else {
    Write-Verbose "Found Keepass install location at '$installPath'."
}

$sourcePath = Join-Path -Path $toolsDir -ChildPath $pluginName
$destPath  = Join-Path -Path $installPath -ChildPath 'Plugins'

$null = Copy-Item -Path $sourcePath -Destination $destPath -Force

# save the install path so we can use it at uninstall
Set-Content -Path $installLog -Value (Join-Path -Path $destPath -ChildPath $pluginName) -Force

if (Get-Process -Name 'KeePass' -ErrorAction SilentlyContinue) {
    Write-Warning ("Keepass is currently running. '{0}' will be available at next restart." -f $env:ChocolateyPackageName)
}
else {
    Write-Host ("'{0}' will be loaded the next time KeePass is started." -f $env:ChocolateyPackageName)
}
tools\chocolateyUninstall.ps1
$ErrorActionPreference = 'Stop'

$toolsDir = Split-Path -Parent $MyInvocation.MyCommand.Definition
$installLog = Join-Path -Path $toolsDir -ChildPath ("{0}-install.log" -f $env:ChocolateyPackageName)

if (Test-Path -Path $installLog) {
    $installPath = Get-Content -Path $installLog -TotalCount 1
    $null = Remove-Item -Path $installPath -Force
}
else {
    throw "During install we created a log file '$installLog' with the path RuleBuilder was installed to. Cannot find this file so don't know where it was installed to and cannot continue."
}
tools\HaveIBeenPwned.plgx
 
tools\LICENSE.txt
From: https://github.com/andrew-schofield/keepass2-haveibeenpwned/blob/master/LICENSE

MIT License

Copyright (c) 2017-2019 Andrew Schofield

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
tools\VERIFICATION.txt
VERIFICATION
Verification is intended to assist the Chocolatey moderators and community
in verifying that this package's contents are trustworthy.

1. Please go to the project releases at https://github.com/andrew-schofield/keepass2-haveibeenpwned/releases;
2. Download the version that is the same as this package version;
3. From a PowerShell command line run:

     Get-FileHash <filename>

   against both the ZIP file included in the package and the one downloaded and they should match;

Log in or click on link to see number of positives.

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.

Version Downloads Last Updated Status

Discussion for the KeePass Plugin Have I Been Pwned Package

Ground Rules:

  • This discussion is only about KeePass Plugin Have I Been Pwned and the KeePass Plugin Have I Been Pwned package. If you have feedback for Chocolatey, please contact the Google Group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or KeePass Plugin Have I Been Pwned, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.
comments powered by Disqus