May 29, 2017, 03:45:03 PM
Welcome, Guest. Please login or register.


Author Topic: CloudBleed Checker  (Read 535 times)

Offline _amonsec

  • Top Hat Member
  • Prospect
  • ********
  • Posts: 45
  • Internets: +35/-0
  • 1336 working to become 1337
CloudBleed Checker
« on: March 15, 2017, 03:59:03 AM »
Hi everybody.
A little bit latter, sadly, today we gonna see how we can find if we need to change our password after the Cloud Bleed bug scandal.

For more information:
Or less technically here:

  • Export to CSV
First we need to create a CSV file with our passwords, and I hope people here didn't use same password for all services/web-sites/applications.

For Firefox passwords export :

For Google Chrome and Opera passwords export :

For Keepass / KeepassX passwords export :

For other type of password export it's easy to find a tutorial on Google. :)
  • Run the script
Here we going to use an Python (2.7) script from github:

  • OSX, or Linux environments;
  • Python 2.7 or later;
  • Existing /tmp/password.csv from the above steps;
  • from this project existing in /tmp/
Now we can run the script and see if we are r3kt:
Code: [Select]
root@ths-amonsec:/opt# git clone
root@ths-amonsec:/opt# cp CloudBleed/ /tmp/ && cd /tmp/
root@ths-amonsec:/tmp# chmod +x
root@ths-amonsec:/tmp# ./

Fortunately all my passwords are safe , but it's not the case of everybody.
It's very important to check this things, to not being pwn later.

Hope this little post help few people.
I gonna try to be more quicker next time for event like that.

ʕ •ᴥ•ʔ
« Last Edit: March 15, 2017, 05:03:31 AM by _amonsec »
"A computer is only as good as it's user" - R4V3N