Password Search

Password Search Guide

Endpoint: /search-by-password

Required Permissions: search-by-password

Overview

The Password Search endpoint allows you to search for compromised credentials using specific passwords. This endpoint is particularly useful for identifying weak password usage across your organization and detecting password reuse.

Use Cases

  • Detect common password usage
  • Find password reuse patterns
  • Identify weak passwords
  • Monitor default credentials
  • Track password policy violations

Request Format

{
    "passwords": [
        "Password123!",
        "Welcome2024"
    ],
    "sort_by": "date_compromised",
    "sort_direction": "desc",
    "types": [
        "employees",
        "users"
    ],
    "domains": [
        "example.com"
    ],
    "filter_credentials": true,
    "start_date": "2024-01-01T00:00:00Z",
    "end_date": "2024-12-31T23:59:59Z"
}

Required Parameters

ParameterTypeDescriptionConstraints
passwordsarray[string]List of passwords to search1-50 passwords

Optional Parameters

ParameterTypeDefaultDescription
sort_bystring"date_compromised"Sort by "date_compromised" or "date_uploaded"
sort_directionstring"desc"Sort direction: "asc" or "desc"
typesarray[string]all typesFilter by "employees", "users"
domainsarray[string][]Filter by specific domains
filter_credentialsbooleantrueReturn only matched credentials
start_datedatetimenullFilter results after this date
end_datedatetimenullFilter results before this date

Common Password Patterns

1. Default Credentials

{
    "passwords": [
        "admin",
        "password",
        "default"
    ],
    "types": [
        "employees"
    ],
    "sort_by": "date_compromised",
    "sort_direction": "desc"
}

2. Seasonal Passwords

{
    "passwords": [
        "Summer2024!",
        "Winter2024!"
    ],
    "domains": [
        "example.com"
    ],
    "types": [
        "employees"
    ]
}

3. Company-Specific

{
    "passwords": [
        "Company2024!",
        "Welcome@Company"
    ],
    "domains": [
        "company.com"
    ],
    "filter_credentials": true
}

Best Practices

1. Password Selection

  • Check common variations
  • Include seasonal patterns
  • Monitor default passwords
  • Track policy-compliant patterns

2. Search Strategy

  • Group related passwords
  • Monitor critical systems
  • Track temporal patterns
  • Analyze reuse patterns

3. Security Considerations

  • Handle passwords securely
  • Encrypt communications
  • Limit access to results
  • Document searches properly

Implementation Examples

Basic Password Search

async def search_passwords(passwords):
    return await api.post('/search-by-password', {
        'passwords': passwords,
        'sort_by': 'date_compromised',
        'filter_credentials': True
    })

Pattern Analysis

async def analyze_password_pattern(base_pattern):
    variations = generate_password_variations(base_pattern)
    results = await search_passwords(
        passwords=variations[:50],  # Respect limit
        types=['employees'],
        sort_by='date_compromised'
    )
    return analyze_results(results)

Continuous Monitoring

async def monitor_default_passwords():
    common_passwords = load_common_passwords()
    results = []
    for batch in chunk_list(common_passwords, 50):
        response = await search_passwords(
            passwords=batch,
            start_date=get_last_check_date()
        )
        results.extend(response.data)
    return analyze_findings(results)

Error Handling

Common Errors

StatusCauseSolution
400Empty passwordValidate input
400Too many passwordsReduce batch size to ≀50
408Request timeoutReduce batch size
429Rate limit exceededImplement backoff

Security Best Practices

1. Input Handling

  • Sanitize passwords
  • Remove sensitive data
  • Handle special characters
  • Validate input length

2. Result Processing

  • Encrypt findings
  • Secure storage
  • Limit access
  • Audit usage

3. Operational Security

  • Document searches
  • Track patterns
  • Monitor usage
  • Secure communications

Response Analysis

1. Pattern Detection

  • Password reuse
  • Common patterns
  • Policy violations
  • Temporal trends

2. Risk Assessment

  • Credential exposure
  • Account compromise
  • Password strength
  • Reuse impact

3. Remediation Planning

  • Password reset
  • Policy updates
  • User training
  • System hardening

Integration Tips

1. Password Policy Enforcement

  • Check against policy
  • Monitor violations
  • Track changes
  • Update requirements

2. Security Tools

  • SIEM integration
  • IDS/IPS updates
  • Access control
  • Threat intelligence

3. Incident Response

  • Alert generation
  • Case management
  • Response automation
  • Documentation

Performance Optimization

1. Search Efficiency

  • Batch requests
  • Cache results
  • Rate limiting
  • Error handling

2. Result Processing

  • Filter relevant data
  • Group findings
  • Analyze patterns
  • Generate reports

Monitoring and Alerts

1. Critical Findings

  • Default passwords
  • Policy violations
  • Mass reuse
  • New patterns

2. Metrics Tracking

  • Search volumes
  • Pattern frequency
  • Error rates
  • Response times

Compliance Considerations

1. Documentation

  • Search justification
  • Result handling
  • Access control
  • Audit trails

2. Data Protection

  • Password encryption
  • Secure storage
  • Access logging
  • Retention policies

3. Privacy

  • Data minimization
  • Purpose limitation
  • User notification
  • Rights management