Hi @boutzamat,
WordFence uses HIBPv2 ( https://haveibeenpwned.com/API/v2 ) to check if your password has been leaked.
You have two ways of checking if your password has been leaked.
1. Type your password into this website to check: https://haveibeenpwned.com/Passwords
2. Alternatively, you can check without typing your password:
a. Determine your password’s SHA-1, using https://onlinemd5.com/ (scroll down, select SHA-1)
b. Navigate to https://noc1.wordfence.com/passwords/*****.txt (replacing ***** with the first 5 characters of your SHA-1 hash)
c. Search for the remaining characters in your SHA-1 hash to see if it has been leaked
So for example, I’ll pretend my password is password
.
a. I have determined that the SHA-1 for password is 5BAA61E4C9B93F3F0682250B6CF8331B7EE68FD8
b. The first five characters is 5BAA6
(must be uppercase), so I’ll navigate to https://noc1.wordfence.com/passwords/5BAA6.txt
c. The remaining characters after 5BAA6
is 1E4C9B93F3F0682250B6CF8331B7EE68FD8
I am able to find 1E4C9B93F3F0682250B6CF8331B7EE68FD8
within the text file, so I can conclude that my password has been leaked.
Here are some resources on what WordFence offers in password leakage protection.
https://www.wordfence.com/blog/2017/12/password-auditing-feature-update/
https://www.wordfence.com/blog/2018/03/password-leak-attacks-wordpress/
Dave