This commit is contained in:
Parker 2022-09-27 17:31:57 -05:00
parent 0a8381cf8e
commit 86ad1f3220
5 changed files with 123 additions and 0 deletions

8
.env.example Normal file
View File

@ -0,0 +1,8 @@
BITWARDEN_CLIENT_ID=
BITWARDEN_CLIENT_SECRET=
BITWARDEN_MASTER_PASSWORD=
SKIP_ACCOUNTS=
TWILIO_ACCOUNT_SID=
TWILIO_AUTH_TOKEN=
TWILIO_FROM_NUMBER=
MY_PHONE_NUMBER=

1
.gitignore vendored Normal file
View File

@ -0,0 +1 @@
.env

24
LICENSE Normal file
View File

@ -0,0 +1,24 @@
This is free and unencumbered software released into the public domain.
Anyone is free to copy, modify, publish, use, compile, sell, or
distribute this software, either in source code form or as a compiled
binary, for any purpose, commercial or non-commercial, and by any
means.
In jurisdictions that recognize copyright laws, the author or authors
of this software dedicate any and all copyright interest in the
software to the public domain. We make this dedication for the benefit
of the public at large and to the detriment of our heirs and
successors. We intend this dedication to be an overt act of
relinquishment in perpetuity of all present and future rights to this
software under copyright law.
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
For more information, please refer to <https://unlicense.org>

16
README.md Normal file
View File

@ -0,0 +1,16 @@
# Bitwarden Password Checker (UNIX Systems ONLY)
## Uses the Bitwarden-cli tool - available [here](https://bitwarden.com/help/cli/) -, the Twilio API, and the HaveIBeenPwned API in order to check the passwords in your vault against the SHA-1 hashes of compromised passwords. If a compromised password is found, it alerts you with a text message.
<br></br>
## In order to setup everything, you must enter all of the necessary information into a .env file. Please note, for the `SKIP_ACCOUNTS` field, account names should be separated by a comma. If you would not like to skip any accounts, simply do not fill in this field, however, do not delete the entry.
## Also, make sure to install all of the necessary dependencies (pexpect, twilio, python-dotenv, requests)
<br></br>
## Also note, your passwords are NEVER exposed to the public HaveIBeenPwned API. Your passwords are taken in plain text from your Bitwarden vault and turned to SHA-1 hashes. Then, ONLY the first 5 characters of the hash are sent to the API, which returns all hashes with the matching characters. This list is then checked against the full hashes stored in a python list.
<br></br>
### Side note on the dependency of UNIX systems. This is because of the need for the pexpect module, which is used to login to your Bitwarden account with your API credentials. The functions which are used are only available for use on UNIX based systems.

74
main.py Normal file
View File

@ -0,0 +1,74 @@
from subprocess import Popen, PIPE
from dotenv import load_dotenv
from twilio.rest import Client
import pexpect
import hashlib
import requests
import json
import os
load_dotenv()
bitwarden_client_id = os.getenv('BITWARDEN_CLIENT_ID')
bitwarden_client_secret = os.getenv('BITWARDEN_CLIENT_SECRET')
bitwarden_master_password = os.getenv('BITWARDEN_MASTER_PASSWORD')
skip_accounts = os.getenv('SKIP_ACCOUNTS').split(',')
twilio_account_sid = os.getenv('TWILIO_ACCOUNT_SID')
twilio_auth_token = os.getenv('TWILIO_AUTH_TOKEN')
twilio_from_number = os.getenv('TWILIO_FROM_NUMBER')
my_phone_number = os.getenv('MY_PHONE_NUMBER')
for acc in skip_accounts:
location = skip_accounts.index(acc)
skip_accounts[location] = acc.upper()
try:
child = pexpect.spawn('bw login --apikey')
child.expect('client_id.*')
child.sendline(bitwarden_client_id)
child.expect('client_secret.*')
child.sendline(bitwarden_client_secret)
child.readlines()
except pexpect.exceptions.EOF:
pass
proc = Popen(['bw','unlock'], stdin=PIPE, encoding='utf-8')
proc.communicate(input=bitwarden_master_password)
proc = Popen(['bw','list','items'], stdin=PIPE, stdout=PIPE, encoding='utf-8')
proc.communicate(input=bitwarden_master_password)
stdout, stderr = proc.communicate()
data = json.loads(stdout.encode('utf-8'))
compromised_passwords = []
for i in data:
try:
name = i['name']
password = i['login']['password']
hashed_pass = hashlib.sha1(password.encode('utf-8')).hexdigest()
check_api = requests.get('https://api.pwnedpasswords.com/range/' + hashed_pass[:5])
if hashed_pass[5:].upper() in check_api.text and name.upper() not in skip_accounts:
compromised_passwords.append({name: password})
except KeyError:
pass
if compromised_passwords:
num = len(compromised_passwords)
message = f"{len(compromised_passwords)} of your passwords {'has' if num==1 else 'have'} been compromised. Please change the passwords for the following accounts.\n\n"
for entry in compromised_passwords:
for key, value in entry.items():
message += f"Account: {key}\nPassword: {value}\n\n"
client = Client(twilio_account_sid, twilio_auth_token)
message = client.messages \
.create(
body=message,
from_=twilio_from_number,
to=my_phone_number
)