[Xon] Password Tools

[Xon] Password Tools 3.9.0

No permission to download
Author newimage
Creation date
XF Compatibility
  1. 2.1.x
  2. 2.2.x
Headline
This modification mostly follows the principles of Dan Wheelers password strength estimator zxcvbn.
Short Description
FREE Download Premium and Nulled [Xon] Password Tools 3.9.0 version from NullPro Community. It is zip Extention type and 523.5 KB File size. From [Xon] Password Tools have 14 discussion, 13 Updates, 682 Views.
Password Tools
Description

password_strength.png



Source
This modification mostly follows the principles of Dan Wheelers password strength estimator zxcvbn. It does not weight password strength by their combination of upper/lower letters, special characters and numbers, but on how easy they are to crack in reality.

To increase the safety of your users account, you can force them to use passwords of a minimum length, minimum strength and even force them to exclude certain words from their passwords (like your site name, the topic your site refers to, etc.).


But the other side of the equation, is no matter how secure the password is, if it has been compromised not password strength estimator will help make it better. As such NIST has the following guidance: check passwords against those obtained from previous data breaches. Pwned Password integration does that.
zxcvbn Readme said:


zxcvbn is a password strength estimator inspired by password crackers. Through pattern matching and conservative entropy calculations, it recognizes and weighs 10k common passwords, common names and surnames according to US census data, popular English words, and other common patterns like dates, repeats (aaa), sequences (abcd), keyboard patterns (qwertyuiop), and l33t speak.

Consider using zxcvbn as an algorithmic alternative to password policy — it is more secure, flexible, and usable when sites require a minimal complexity score in place of annoying rules like "passwords must contain three of {lower, upper, numbers, symbols}".
Pwned password said:


Password reuse and credential stuffing

Password reuse is normal. It's extremely risky, but it's so common because it's easy and people aren't aware of the potential impact. Attacks such as credential stuffing take advantage of reused credentials by automating login attempts against systems using known emails and password pairs.


NIST's guidance: check passwords against those obtained from previous data breaches

The Pwned Passwords service was created in August 2017 after NIST released guidance specifically recommending that user-provided passwords be checked against existing data breaches . The rationale for this advice and suggestions for how applications may leverage this data is described in detail in the blog post titled Introducing 306 Million Freely Downloadable Pwned Passwords. In February 2018, version 2 of the service was released with more than half a billion passwords, each now also with a count of how many times they'd been seen exposed.

Click to expand...
Features
  • Show password feature, allow users to toggle to see what they have actually entered.
  • Show users how strong their passwords really are when it comes to crack-attempts
  • Deliver instant feedback if password and password-confirm match and/or certain requirements are not met
  • Force users to choose passwords with a minimum strength
  • Force users to choose passwords with a minimum length
  • Force users to chooce a password not containing words from a blacklist you define
  • No cheating: This modification also controls users passwords on server side with Ben Jeavos php-implementation of zxcvbn.
  • Easy styling through XenForo Style Properties
Options
options-png.184541


Author
newimage
Views
682
Extention type
zip
File size
523.5 KB
First release
Last update
Rating
0.00 star(s) 0 ratings
Link was Broken? Please  Send Message to NP Team with Ticket, You will get it very quickly!
Support Developer If you are satisfied with your test or project have earn money successfully, Maybe you can click more information button to support with buying.
More resources from newimage

Latest updates

3.9.0 - changelog
Add "Force password reset on compromised password" option This option is likely overkill for...
3.8.2 - changelog
Fix changing user entity while a write is pending in some cases Add "Use rejected password...
3.8.0 - changelog
Require StandardLib v1.18.0+ Add new "User-group for compromised passwords" option, which adds...
3.7.5 - changelog
Fix "Minimum time between triggering compromised password alerts on login" operating in seconds...
3.7.4 - 3.7.4
Fix password checks could incorrectly apply when resetting a user's password

Similar resources

[FF] Page Criteria for Xon Browser Detection J
dd a new set of criterion to the Page criteria
0.00 star(s) 0 ratings
Views
196
Updated
[Xon] Change Post Date by Xon J
Adds the in-line moderator option "Change Post Date".
0.00 star(s) 0 ratings
Views
265
Updated
[Xon] Click to Shrink J
Shrink quotes after they have expanded
0.00 star(s) 0 ratings
Views
152
Updated
Back
Top