Skip to main content

entra user hibp

Allows you to retrieve all accounts that have been pwned with the specified username

Usage

m365 entra user hibp [options]

Alias

m365 aad user hibp [options]

Options

-n, --userName <userName>

The name of the user to retrieve information for.

--apiKey, <apiKey>

Have I been pwned API Key. You can buy it from https://haveibeenpwned.com/API/Key

--domain, [domain]

Limit the returned breaches only contain results with the domain specified.

-h, --help [help]

Output usage information. Optionally, specify which section of command's help you want to see. Allowed values are options, examples, remarks, response, full. Default is options.

--query [query]

JMESPath query string. See http://jmespath.org/ for more information and examples.

-o, --output [output]

Output type. json, text, csv, md, none. Default json.

--verbose

Runs command with verbose logging.

--debug

Runs command with debug logging.

Remarks

If the user with the specified user name doesn't involved in any breach, you will get a No pwnage found message when running in debug or verbose mode.

If API Key is invalid, you will get a Required option apiKey not specified error.

Examples

Check if user with by a user name is in a data breach

m365 entra user hibp --userName account-exists@hibp-integration-tests.com --apiKey _YOUR-API-KEY_

Check if user by a user name is in a data breach against the domain specified

m365 entra user hibp --userName account-exists@hibp-integration-tests.com --apiKey _YOUR-API-KEY_ --domain adobe.com

Response

[
{
"Name": "Adobe",
"Title": "Adobe",
"Domain": "adobe.com",
"BreachDate": "2013-10-04",
"AddedDate": "2013-12-04T00:00Z",
"ModifiedDate": "2022-05-15T23:52Z",
"PwnCount": 152445165,
"Description": "In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, <em>encrypted</em> password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also <a href=\"http://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html\" target=\"_blank\" rel=\"noopener\">disclosed much about the passwords</a> adding further to the risk that hundreds of millions of Adobe customers already faced.",
"DataClasses": [
"Email addresses",
"Password hints",
"Passwords",
"Usernames"
],
"IsVerified": true,
"IsFabricated": false,
"IsSensitive": false,
"IsRetired": false,
"IsSpamList": false,
"LogoPath": "https://haveibeenpwned.com/Content/Images/PwnedLogos/Adobe.png"
}
]

More information

CTRL + M