mirror of
https://github.com/jaegeral/security-apis.git
synced 2024-10-01 05:05:45 -04:00
unofficial HIBP endpoint: domainsearch
This commit is contained in:
parent
1e8d0322c2
commit
62cb76d6de
20
apidocs/haveIBeenPwned.md
Normal file
20
apidocs/haveIBeenPwned.md
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
Unofficial API-Endpoints for HIBP
|
||||||
|
=================================
|
||||||
|
|
||||||
|
## DomainSearch
|
||||||
|
|
||||||
|
When using the [domain search feature](https://haveibeenpwned.com/DomainSearch) from HIBP you receive email
|
||||||
|
notifications with a token to get all breaches for all accounts within the domain.
|
||||||
|
|
||||||
|
Currently (April 2018), to get the search results for this token, the workflow and endpoints are:
|
||||||
|
|
||||||
|
* The token can be extracted from a link of the form `https://haveibeenpwned.com/DomainSearch/${token}`, which is contained in the mail from HIBP
|
||||||
|
* Trigger a mail with links to the search-result: `GET https://haveibeenpwned.com/api/multidomainsearch/${token}`
|
||||||
|
Response should be `"ReadyForVerificationToken"`
|
||||||
|
* In the new mail, look for a link of the form `https://haveibeenpwned.com/DomainSearch/${token}/json` and `GET` it. It contains the full result of your search in json format:
|
||||||
|
```
|
||||||
|
{
|
||||||
|
"BreachSearchResults": [ { DomainName: "...", Alias: "...", Breaches: [ <See breach model from https://haveibeenpwned.com/API/v2#BreachModel> ] }]
|
||||||
|
"PasteSearchResults": [ { DomainName: "...", Alias: "...", Pastes: [ <See paste model from https://haveibeenpwned.com/API/v2#PasteModel> ] }]
|
||||||
|
}
|
||||||
|
```
|
Loading…
Reference in New Issue
Block a user