How do I reset passwords on multiple websites easily?












33















One of my old email addresses was involved in the recent Whitepages breach disclosure (source: Have I Been Pwned).



I don't remember on which websites I used that email address for registration, but I would like to reset my password everywhere possible. Websites could include: Facebook, Google, Amazon, eBay, Paypal, etc. - basically the top N commonly-used or sensitive web applications/platforms.



This is particularly important as I was not using a password manager at the time and may have reused passwords.



Is there an existing way to automate initiating password resets, mainly by requesting password reset emails, on common platforms given a single email address that I have access to?










share|improve this question




















  • 9





    I don't see how that could work so easily as all that. You have way, way more passwords than you think. I thought I had "maybe 20" until I made a spreadsheet and came to discover I had 130. And I'm not a "signer-up" and actively try to keep that number down. Further to that, I don't agree with your idea of "top sites", you forgot Amazon, eBay and Paypal, see how it is? There are so many sites.

    – Harper
    2 days ago








  • 1





    @Harper Indeed, the number of registered sites is likely to be much bigger than anticipated. Even if not on all, my concern is how to automate password resets on at least the top N popular or critical websites. And yes, Amazon and eBay would/should be included in those - I don't claim to have that list ready or that it contains only the 5 entries I mentioned in the question (hence the "etc.")

    – Islay
    2 days ago






  • 1





    Related: API to change passwords?, and cross-site duplicate: What's an efficient way to change my 200+ account passwords?

    – Fabio Turati
    yesterday













  • Automating them would only be worthwhile if you changed them regularly. You would get more security for less effort by changing them once and using a password manager.

    – Spenser Truex
    26 secs ago
















33















One of my old email addresses was involved in the recent Whitepages breach disclosure (source: Have I Been Pwned).



I don't remember on which websites I used that email address for registration, but I would like to reset my password everywhere possible. Websites could include: Facebook, Google, Amazon, eBay, Paypal, etc. - basically the top N commonly-used or sensitive web applications/platforms.



This is particularly important as I was not using a password manager at the time and may have reused passwords.



Is there an existing way to automate initiating password resets, mainly by requesting password reset emails, on common platforms given a single email address that I have access to?










share|improve this question




















  • 9





    I don't see how that could work so easily as all that. You have way, way more passwords than you think. I thought I had "maybe 20" until I made a spreadsheet and came to discover I had 130. And I'm not a "signer-up" and actively try to keep that number down. Further to that, I don't agree with your idea of "top sites", you forgot Amazon, eBay and Paypal, see how it is? There are so many sites.

    – Harper
    2 days ago








  • 1





    @Harper Indeed, the number of registered sites is likely to be much bigger than anticipated. Even if not on all, my concern is how to automate password resets on at least the top N popular or critical websites. And yes, Amazon and eBay would/should be included in those - I don't claim to have that list ready or that it contains only the 5 entries I mentioned in the question (hence the "etc.")

    – Islay
    2 days ago






  • 1





    Related: API to change passwords?, and cross-site duplicate: What's an efficient way to change my 200+ account passwords?

    – Fabio Turati
    yesterday













  • Automating them would only be worthwhile if you changed them regularly. You would get more security for less effort by changing them once and using a password manager.

    – Spenser Truex
    26 secs ago














33












33








33


8






One of my old email addresses was involved in the recent Whitepages breach disclosure (source: Have I Been Pwned).



I don't remember on which websites I used that email address for registration, but I would like to reset my password everywhere possible. Websites could include: Facebook, Google, Amazon, eBay, Paypal, etc. - basically the top N commonly-used or sensitive web applications/platforms.



This is particularly important as I was not using a password manager at the time and may have reused passwords.



Is there an existing way to automate initiating password resets, mainly by requesting password reset emails, on common platforms given a single email address that I have access to?










share|improve this question
















One of my old email addresses was involved in the recent Whitepages breach disclosure (source: Have I Been Pwned).



I don't remember on which websites I used that email address for registration, but I would like to reset my password everywhere possible. Websites could include: Facebook, Google, Amazon, eBay, Paypal, etc. - basically the top N commonly-used or sensitive web applications/platforms.



This is particularly important as I was not using a password manager at the time and may have reused passwords.



Is there an existing way to automate initiating password resets, mainly by requesting password reset emails, on common platforms given a single email address that I have access to?







password-reset have-i-been-pwned






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited 17 mins ago









Peter Mortensen

70449




70449










asked 2 days ago









IslayIslay

29637




29637








  • 9





    I don't see how that could work so easily as all that. You have way, way more passwords than you think. I thought I had "maybe 20" until I made a spreadsheet and came to discover I had 130. And I'm not a "signer-up" and actively try to keep that number down. Further to that, I don't agree with your idea of "top sites", you forgot Amazon, eBay and Paypal, see how it is? There are so many sites.

    – Harper
    2 days ago








  • 1





    @Harper Indeed, the number of registered sites is likely to be much bigger than anticipated. Even if not on all, my concern is how to automate password resets on at least the top N popular or critical websites. And yes, Amazon and eBay would/should be included in those - I don't claim to have that list ready or that it contains only the 5 entries I mentioned in the question (hence the "etc.")

    – Islay
    2 days ago






  • 1





    Related: API to change passwords?, and cross-site duplicate: What's an efficient way to change my 200+ account passwords?

    – Fabio Turati
    yesterday













  • Automating them would only be worthwhile if you changed them regularly. You would get more security for less effort by changing them once and using a password manager.

    – Spenser Truex
    26 secs ago














  • 9





    I don't see how that could work so easily as all that. You have way, way more passwords than you think. I thought I had "maybe 20" until I made a spreadsheet and came to discover I had 130. And I'm not a "signer-up" and actively try to keep that number down. Further to that, I don't agree with your idea of "top sites", you forgot Amazon, eBay and Paypal, see how it is? There are so many sites.

    – Harper
    2 days ago








  • 1





    @Harper Indeed, the number of registered sites is likely to be much bigger than anticipated. Even if not on all, my concern is how to automate password resets on at least the top N popular or critical websites. And yes, Amazon and eBay would/should be included in those - I don't claim to have that list ready or that it contains only the 5 entries I mentioned in the question (hence the "etc.")

    – Islay
    2 days ago






  • 1





    Related: API to change passwords?, and cross-site duplicate: What's an efficient way to change my 200+ account passwords?

    – Fabio Turati
    yesterday













  • Automating them would only be worthwhile if you changed them regularly. You would get more security for less effort by changing them once and using a password manager.

    – Spenser Truex
    26 secs ago








9




9





I don't see how that could work so easily as all that. You have way, way more passwords than you think. I thought I had "maybe 20" until I made a spreadsheet and came to discover I had 130. And I'm not a "signer-up" and actively try to keep that number down. Further to that, I don't agree with your idea of "top sites", you forgot Amazon, eBay and Paypal, see how it is? There are so many sites.

– Harper
2 days ago







I don't see how that could work so easily as all that. You have way, way more passwords than you think. I thought I had "maybe 20" until I made a spreadsheet and came to discover I had 130. And I'm not a "signer-up" and actively try to keep that number down. Further to that, I don't agree with your idea of "top sites", you forgot Amazon, eBay and Paypal, see how it is? There are so many sites.

– Harper
2 days ago






1




1





@Harper Indeed, the number of registered sites is likely to be much bigger than anticipated. Even if not on all, my concern is how to automate password resets on at least the top N popular or critical websites. And yes, Amazon and eBay would/should be included in those - I don't claim to have that list ready or that it contains only the 5 entries I mentioned in the question (hence the "etc.")

– Islay
2 days ago





@Harper Indeed, the number of registered sites is likely to be much bigger than anticipated. Even if not on all, my concern is how to automate password resets on at least the top N popular or critical websites. And yes, Amazon and eBay would/should be included in those - I don't claim to have that list ready or that it contains only the 5 entries I mentioned in the question (hence the "etc.")

– Islay
2 days ago




1




1





Related: API to change passwords?, and cross-site duplicate: What's an efficient way to change my 200+ account passwords?

– Fabio Turati
yesterday







Related: API to change passwords?, and cross-site duplicate: What's an efficient way to change my 200+ account passwords?

– Fabio Turati
yesterday















Automating them would only be worthwhile if you changed them regularly. You would get more security for less effort by changing them once and using a password manager.

– Spenser Truex
26 secs ago





Automating them would only be worthwhile if you changed them regularly. You would get more security for less effort by changing them once and using a password manager.

– Spenser Truex
26 secs ago










6 Answers
6






active

oldest

votes


















34














No, not really - they all have different processes for verifying your identity for password reset requests, and there isn't any standard for bulk password resets. For example, Apple may use a device which is registered to the account as a confirmation that it's you sending the request, while Facebook uses different schemes depending on whether you're changing your password from a device where you've previously logged in, or from a completely unrelated one.



Easiest way is probably to go through common websites (e.g. work through a list like https://en.wikipedia.org/wiki/List_of_most_popular_websites, ignoring any which you are sure don't apply) providing the email address you want to reset, and watching for reset emails. It's not perfect, but if you're changing the ones you know are sensitive (e.g. ones which have credit card details associated, or email accounts, or government systems), that's ok - you know that those accounts will have unique passwords, even if an attacker may be able to log into your abandoned MySpace (or other defunct social network) account with an old password.






share|improve this answer



















  • 7





    I'd add to this that while you're in the process of doing this, I would invest a bit more time into adding these sites to a password manager (e.g. LastPass, 1Password, KeePass, Bitwarden, ...). This allows you to keep track of the accounts you have, allows you to use unique passwords for each site (which will prevent a password leaked on site A being used to login on site B) and some even monitor your account's appearance in the HIBP database).

    – BlueCacti
    yesterday











  • @BlueCacti: Definitely. That's my current setup since the past few years already.

    – Islay
    yesterday











  • And this is one more reason why using a password manager is good practice. You "change" the password on those sites by letting the manager give them a unique password in the first place. Then, the breach comes (and it will come; it comes for all of us eventually) and most of the work is already done. You only need to change the failed site, because the others already used a unique password. Even better, close the account at the site that failed if you can.

    – Joel Coehoorn
    13 hours ago





















44














This is a known problem without an existing solution. Some password management tools are working on it, but it is not complete or fool-proof.



For example: https://helpdesk.lastpass.com/generating-a-password/




Auto-Password Change will change a site’s password with a
single-click. This feature currently supports 75 of the most popular
websites. You can see the full list of supported websites below.




In general, though, when you use a password manager for all your accounts, 90% of the work you need to do is already done. You know which sites use that username/email, and you can avoid re-using passwords in the first place (or know which accounts use a shared password).






share|improve this answer



















  • 3





    @emory I'm not sure that is true. An authenticated process would not expose a DoS threat to the process.

    – schroeder
    2 days ago






  • 2





    As I understand it, OP wants to send a message to a bunch of sites - facebook, google, spotify, netflex, etc - saying "hey, I am pretty sure I have an account with you guys and my username is op@somedomain.com. This account has been compromised. Please lock me out." Why couldn't I do the same with all the email addresses that I know @schroeder to use?

    – emory
    2 days ago






  • 7





    @emory .... because that would be silly. And no one is talking about that. And that has nothing to do with anything I said or what the OP said.

    – schroeder
    2 days ago






  • 2





    @emory I still have access to the old email account, so schroeder's idea of an authenticated process to trigger the requests seems to mitigate the issue IMO.

    – Islay
    2 days ago






  • 1





    I wonder if anyone attempted to use AI to solve this problem: teach a program how reset processes look like, where to find them looking at a webpage and how to submit the username/email to reset. If we are lucky this might work for a majority of websites and not an hardcoded list of less than 100.

    – Bakuriu
    yesterday



















5














One tip to help you out on your journey is that multiple sites have recently implemented the "well-known password change URL". This is something you can plug in to any (supporting) website that redirects to the page that lets you change your password.



Take the homepage of the site, and add /.well-known/change-password to the end. Examples:



accounts.google.com/.well-known/change-password
-> https://myaccount.google.com/signinoptions/password

github.com/.well-known/change-password
-> https://github.com/settings/admin

twitter.com/.well-known/change-password
-> https://twitter.com/settings/password

meta.discourse.org/.well-known/change-password
-> https://meta.discourse.org/my/preferences/account





share|improve this answer
























  • I had never heard of those. Is it trying to append itself to this list?

    – Michael
    1 hour ago



















4














One alternative solution to identify sites that you used your email address on is to look into your browser's saved passwords.



This will allow you to see every site you have saved passwords for in your browser which might help you identify ones that need to be changed.



Obviously, this only works if you use the browser's "save password" feature.






share|improve this answer










New contributor




Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 2





    So, in other words, look in your password manager. And sometimes, your password manager is your browser.

    – schroeder
    2 days ago






  • 6





    True, although I think most people would not consider their browser a true "password manager". This is just another suggestion that could be easy to overlook for others who are trying to find websites they forgot they registered on

    – Jacob
    2 days ago






  • 1





    I would say "almost allways, your browser is your password manager."

    – ThoriumBR
    2 days ago



















2














It's a hard problem because the top list of websites is so personal... And what you have to lose is in no way proportional to the site's popularity on any index of popular sites.



And only you know where you might have accounts.



For instance, I consider gaming sites to be more critical than banking sites. Because there are much fewer controls and less legal peril involved in hacking MMO gaming accounts, so they are the darlings of crackers. On the other hand, if you're done with Maplestory, you may not care.



But you certainly don't need to care about your Eve Online account if you definitely never played it. Only you know this sort of thing.



If you think you might have used a site in the past, why not just try your old credential?



Why not just spam every website with password reset requests?



They're not going to cooperate with large scale automated requests of this type.



First, the website acknowledging whether an email has an account, would empower spear phishing. Scammer gets a billion emails (easy enough), they start banging the website's password reset to learn "does this email have an account here, or not?" Now they have a list of 1 million emails that do. Now they start spear-phishing those known account holders. Put them on a daily newsletter where unsubscribe requires a login, that kind of thing. This is a "many email addresses against a single site" attack. The site's best defense is to add friction to the password reset process, e.g. a CAPTCHA, or simply design the password-reset process so it tells the inquirer nothing about whether an account exists. This is even more important for sites like Ashley Madison or Furries where having an account there could be embarrassing.



Second, if a cracker managed to gain control of an email, they could simply do exactly what you're trying to do - ascertain which websites this email has an account on. With a full dossier, they can then attack those sites or simply sell the credentials for more than they could otherwise. This is a "single email vs many sites" attack. In this case, the site needs to control one-off access to the password reset function - something like a CAPTCHA is called for. And 2-factor authentication - but again, this 2FA must not disclose to the casual inquirer whether an account here exists.



Because of this, I don't see a probability of anyone writing an app to do this. The writer would find herself in a hacking "arms race" with many companies trying to stop her automation from working.






share|improve this answer
























  • Lol...You made me google Furries and Ashley Madison...

    – Aganju
    2 days ago













  • The spear phishing/email enumeration isn't an issue if the mass password reset process itself requires email verification. However, good point re if a cracker managed to gain control of an email.... But then, in the case of a determined attacker, whether the manual nature of the process is enough of a deterrent - compared to the convenience afforded by its automation to genuine users - is debatable.

    – Islay
    yesterday





















-1














You can absolutely reset passwords automatically if your password manager supports it (I use LastPass) -- even retroactively. You don't have to have created the site using LastPass in order for it to be able to reset your passwords for you. You simply have to load the credentials into it and ask it to perform the password reset function.



In LastPass, simply allow LastPass to remember your credentials for the site (typically by logging in), and then on the Edit Site window of your vault, simply select Auto Change Password below the password field.






share|improve this answer








New contributor




bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





















  • One may not have the old password(s) anymore to load into LastPass.

    – Islay
    2 days ago











  • Lastpasses feature also only works on some of the biggest sites, and even then not reliably. (facebook, battle.net....)

    – Lichtbringer
    2 days ago











  • This is all covered in another answer (along with the weaknesses)

    – schroeder
    yesterday












Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "162"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f206218%2fhow-do-i-reset-passwords-on-multiple-websites-easily%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























6 Answers
6






active

oldest

votes








6 Answers
6






active

oldest

votes









active

oldest

votes






active

oldest

votes









34














No, not really - they all have different processes for verifying your identity for password reset requests, and there isn't any standard for bulk password resets. For example, Apple may use a device which is registered to the account as a confirmation that it's you sending the request, while Facebook uses different schemes depending on whether you're changing your password from a device where you've previously logged in, or from a completely unrelated one.



Easiest way is probably to go through common websites (e.g. work through a list like https://en.wikipedia.org/wiki/List_of_most_popular_websites, ignoring any which you are sure don't apply) providing the email address you want to reset, and watching for reset emails. It's not perfect, but if you're changing the ones you know are sensitive (e.g. ones which have credit card details associated, or email accounts, or government systems), that's ok - you know that those accounts will have unique passwords, even if an attacker may be able to log into your abandoned MySpace (or other defunct social network) account with an old password.






share|improve this answer



















  • 7





    I'd add to this that while you're in the process of doing this, I would invest a bit more time into adding these sites to a password manager (e.g. LastPass, 1Password, KeePass, Bitwarden, ...). This allows you to keep track of the accounts you have, allows you to use unique passwords for each site (which will prevent a password leaked on site A being used to login on site B) and some even monitor your account's appearance in the HIBP database).

    – BlueCacti
    yesterday











  • @BlueCacti: Definitely. That's my current setup since the past few years already.

    – Islay
    yesterday











  • And this is one more reason why using a password manager is good practice. You "change" the password on those sites by letting the manager give them a unique password in the first place. Then, the breach comes (and it will come; it comes for all of us eventually) and most of the work is already done. You only need to change the failed site, because the others already used a unique password. Even better, close the account at the site that failed if you can.

    – Joel Coehoorn
    13 hours ago


















34














No, not really - they all have different processes for verifying your identity for password reset requests, and there isn't any standard for bulk password resets. For example, Apple may use a device which is registered to the account as a confirmation that it's you sending the request, while Facebook uses different schemes depending on whether you're changing your password from a device where you've previously logged in, or from a completely unrelated one.



Easiest way is probably to go through common websites (e.g. work through a list like https://en.wikipedia.org/wiki/List_of_most_popular_websites, ignoring any which you are sure don't apply) providing the email address you want to reset, and watching for reset emails. It's not perfect, but if you're changing the ones you know are sensitive (e.g. ones which have credit card details associated, or email accounts, or government systems), that's ok - you know that those accounts will have unique passwords, even if an attacker may be able to log into your abandoned MySpace (or other defunct social network) account with an old password.






share|improve this answer



















  • 7





    I'd add to this that while you're in the process of doing this, I would invest a bit more time into adding these sites to a password manager (e.g. LastPass, 1Password, KeePass, Bitwarden, ...). This allows you to keep track of the accounts you have, allows you to use unique passwords for each site (which will prevent a password leaked on site A being used to login on site B) and some even monitor your account's appearance in the HIBP database).

    – BlueCacti
    yesterday











  • @BlueCacti: Definitely. That's my current setup since the past few years already.

    – Islay
    yesterday











  • And this is one more reason why using a password manager is good practice. You "change" the password on those sites by letting the manager give them a unique password in the first place. Then, the breach comes (and it will come; it comes for all of us eventually) and most of the work is already done. You only need to change the failed site, because the others already used a unique password. Even better, close the account at the site that failed if you can.

    – Joel Coehoorn
    13 hours ago
















34












34








34







No, not really - they all have different processes for verifying your identity for password reset requests, and there isn't any standard for bulk password resets. For example, Apple may use a device which is registered to the account as a confirmation that it's you sending the request, while Facebook uses different schemes depending on whether you're changing your password from a device where you've previously logged in, or from a completely unrelated one.



Easiest way is probably to go through common websites (e.g. work through a list like https://en.wikipedia.org/wiki/List_of_most_popular_websites, ignoring any which you are sure don't apply) providing the email address you want to reset, and watching for reset emails. It's not perfect, but if you're changing the ones you know are sensitive (e.g. ones which have credit card details associated, or email accounts, or government systems), that's ok - you know that those accounts will have unique passwords, even if an attacker may be able to log into your abandoned MySpace (or other defunct social network) account with an old password.






share|improve this answer













No, not really - they all have different processes for verifying your identity for password reset requests, and there isn't any standard for bulk password resets. For example, Apple may use a device which is registered to the account as a confirmation that it's you sending the request, while Facebook uses different schemes depending on whether you're changing your password from a device where you've previously logged in, or from a completely unrelated one.



Easiest way is probably to go through common websites (e.g. work through a list like https://en.wikipedia.org/wiki/List_of_most_popular_websites, ignoring any which you are sure don't apply) providing the email address you want to reset, and watching for reset emails. It's not perfect, but if you're changing the ones you know are sensitive (e.g. ones which have credit card details associated, or email accounts, or government systems), that's ok - you know that those accounts will have unique passwords, even if an attacker may be able to log into your abandoned MySpace (or other defunct social network) account with an old password.







share|improve this answer












share|improve this answer



share|improve this answer










answered 2 days ago









MatthewMatthew

25k78091




25k78091








  • 7





    I'd add to this that while you're in the process of doing this, I would invest a bit more time into adding these sites to a password manager (e.g. LastPass, 1Password, KeePass, Bitwarden, ...). This allows you to keep track of the accounts you have, allows you to use unique passwords for each site (which will prevent a password leaked on site A being used to login on site B) and some even monitor your account's appearance in the HIBP database).

    – BlueCacti
    yesterday











  • @BlueCacti: Definitely. That's my current setup since the past few years already.

    – Islay
    yesterday











  • And this is one more reason why using a password manager is good practice. You "change" the password on those sites by letting the manager give them a unique password in the first place. Then, the breach comes (and it will come; it comes for all of us eventually) and most of the work is already done. You only need to change the failed site, because the others already used a unique password. Even better, close the account at the site that failed if you can.

    – Joel Coehoorn
    13 hours ago
















  • 7





    I'd add to this that while you're in the process of doing this, I would invest a bit more time into adding these sites to a password manager (e.g. LastPass, 1Password, KeePass, Bitwarden, ...). This allows you to keep track of the accounts you have, allows you to use unique passwords for each site (which will prevent a password leaked on site A being used to login on site B) and some even monitor your account's appearance in the HIBP database).

    – BlueCacti
    yesterday











  • @BlueCacti: Definitely. That's my current setup since the past few years already.

    – Islay
    yesterday











  • And this is one more reason why using a password manager is good practice. You "change" the password on those sites by letting the manager give them a unique password in the first place. Then, the breach comes (and it will come; it comes for all of us eventually) and most of the work is already done. You only need to change the failed site, because the others already used a unique password. Even better, close the account at the site that failed if you can.

    – Joel Coehoorn
    13 hours ago










7




7





I'd add to this that while you're in the process of doing this, I would invest a bit more time into adding these sites to a password manager (e.g. LastPass, 1Password, KeePass, Bitwarden, ...). This allows you to keep track of the accounts you have, allows you to use unique passwords for each site (which will prevent a password leaked on site A being used to login on site B) and some even monitor your account's appearance in the HIBP database).

– BlueCacti
yesterday





I'd add to this that while you're in the process of doing this, I would invest a bit more time into adding these sites to a password manager (e.g. LastPass, 1Password, KeePass, Bitwarden, ...). This allows you to keep track of the accounts you have, allows you to use unique passwords for each site (which will prevent a password leaked on site A being used to login on site B) and some even monitor your account's appearance in the HIBP database).

– BlueCacti
yesterday













@BlueCacti: Definitely. That's my current setup since the past few years already.

– Islay
yesterday





@BlueCacti: Definitely. That's my current setup since the past few years already.

– Islay
yesterday













And this is one more reason why using a password manager is good practice. You "change" the password on those sites by letting the manager give them a unique password in the first place. Then, the breach comes (and it will come; it comes for all of us eventually) and most of the work is already done. You only need to change the failed site, because the others already used a unique password. Even better, close the account at the site that failed if you can.

– Joel Coehoorn
13 hours ago







And this is one more reason why using a password manager is good practice. You "change" the password on those sites by letting the manager give them a unique password in the first place. Then, the breach comes (and it will come; it comes for all of us eventually) and most of the work is already done. You only need to change the failed site, because the others already used a unique password. Even better, close the account at the site that failed if you can.

– Joel Coehoorn
13 hours ago















44














This is a known problem without an existing solution. Some password management tools are working on it, but it is not complete or fool-proof.



For example: https://helpdesk.lastpass.com/generating-a-password/




Auto-Password Change will change a site’s password with a
single-click. This feature currently supports 75 of the most popular
websites. You can see the full list of supported websites below.




In general, though, when you use a password manager for all your accounts, 90% of the work you need to do is already done. You know which sites use that username/email, and you can avoid re-using passwords in the first place (or know which accounts use a shared password).






share|improve this answer



















  • 3





    @emory I'm not sure that is true. An authenticated process would not expose a DoS threat to the process.

    – schroeder
    2 days ago






  • 2





    As I understand it, OP wants to send a message to a bunch of sites - facebook, google, spotify, netflex, etc - saying "hey, I am pretty sure I have an account with you guys and my username is op@somedomain.com. This account has been compromised. Please lock me out." Why couldn't I do the same with all the email addresses that I know @schroeder to use?

    – emory
    2 days ago






  • 7





    @emory .... because that would be silly. And no one is talking about that. And that has nothing to do with anything I said or what the OP said.

    – schroeder
    2 days ago






  • 2





    @emory I still have access to the old email account, so schroeder's idea of an authenticated process to trigger the requests seems to mitigate the issue IMO.

    – Islay
    2 days ago






  • 1





    I wonder if anyone attempted to use AI to solve this problem: teach a program how reset processes look like, where to find them looking at a webpage and how to submit the username/email to reset. If we are lucky this might work for a majority of websites and not an hardcoded list of less than 100.

    – Bakuriu
    yesterday
















44














This is a known problem without an existing solution. Some password management tools are working on it, but it is not complete or fool-proof.



For example: https://helpdesk.lastpass.com/generating-a-password/




Auto-Password Change will change a site’s password with a
single-click. This feature currently supports 75 of the most popular
websites. You can see the full list of supported websites below.




In general, though, when you use a password manager for all your accounts, 90% of the work you need to do is already done. You know which sites use that username/email, and you can avoid re-using passwords in the first place (or know which accounts use a shared password).






share|improve this answer



















  • 3





    @emory I'm not sure that is true. An authenticated process would not expose a DoS threat to the process.

    – schroeder
    2 days ago






  • 2





    As I understand it, OP wants to send a message to a bunch of sites - facebook, google, spotify, netflex, etc - saying "hey, I am pretty sure I have an account with you guys and my username is op@somedomain.com. This account has been compromised. Please lock me out." Why couldn't I do the same with all the email addresses that I know @schroeder to use?

    – emory
    2 days ago






  • 7





    @emory .... because that would be silly. And no one is talking about that. And that has nothing to do with anything I said or what the OP said.

    – schroeder
    2 days ago






  • 2





    @emory I still have access to the old email account, so schroeder's idea of an authenticated process to trigger the requests seems to mitigate the issue IMO.

    – Islay
    2 days ago






  • 1





    I wonder if anyone attempted to use AI to solve this problem: teach a program how reset processes look like, where to find them looking at a webpage and how to submit the username/email to reset. If we are lucky this might work for a majority of websites and not an hardcoded list of less than 100.

    – Bakuriu
    yesterday














44












44








44







This is a known problem without an existing solution. Some password management tools are working on it, but it is not complete or fool-proof.



For example: https://helpdesk.lastpass.com/generating-a-password/




Auto-Password Change will change a site’s password with a
single-click. This feature currently supports 75 of the most popular
websites. You can see the full list of supported websites below.




In general, though, when you use a password manager for all your accounts, 90% of the work you need to do is already done. You know which sites use that username/email, and you can avoid re-using passwords in the first place (or know which accounts use a shared password).






share|improve this answer













This is a known problem without an existing solution. Some password management tools are working on it, but it is not complete or fool-proof.



For example: https://helpdesk.lastpass.com/generating-a-password/




Auto-Password Change will change a site’s password with a
single-click. This feature currently supports 75 of the most popular
websites. You can see the full list of supported websites below.




In general, though, when you use a password manager for all your accounts, 90% of the work you need to do is already done. You know which sites use that username/email, and you can avoid re-using passwords in the first place (or know which accounts use a shared password).







share|improve this answer












share|improve this answer



share|improve this answer










answered 2 days ago









schroederschroeder

78.5k30174210




78.5k30174210








  • 3





    @emory I'm not sure that is true. An authenticated process would not expose a DoS threat to the process.

    – schroeder
    2 days ago






  • 2





    As I understand it, OP wants to send a message to a bunch of sites - facebook, google, spotify, netflex, etc - saying "hey, I am pretty sure I have an account with you guys and my username is op@somedomain.com. This account has been compromised. Please lock me out." Why couldn't I do the same with all the email addresses that I know @schroeder to use?

    – emory
    2 days ago






  • 7





    @emory .... because that would be silly. And no one is talking about that. And that has nothing to do with anything I said or what the OP said.

    – schroeder
    2 days ago






  • 2





    @emory I still have access to the old email account, so schroeder's idea of an authenticated process to trigger the requests seems to mitigate the issue IMO.

    – Islay
    2 days ago






  • 1





    I wonder if anyone attempted to use AI to solve this problem: teach a program how reset processes look like, where to find them looking at a webpage and how to submit the username/email to reset. If we are lucky this might work for a majority of websites and not an hardcoded list of less than 100.

    – Bakuriu
    yesterday














  • 3





    @emory I'm not sure that is true. An authenticated process would not expose a DoS threat to the process.

    – schroeder
    2 days ago






  • 2





    As I understand it, OP wants to send a message to a bunch of sites - facebook, google, spotify, netflex, etc - saying "hey, I am pretty sure I have an account with you guys and my username is op@somedomain.com. This account has been compromised. Please lock me out." Why couldn't I do the same with all the email addresses that I know @schroeder to use?

    – emory
    2 days ago






  • 7





    @emory .... because that would be silly. And no one is talking about that. And that has nothing to do with anything I said or what the OP said.

    – schroeder
    2 days ago






  • 2





    @emory I still have access to the old email account, so schroeder's idea of an authenticated process to trigger the requests seems to mitigate the issue IMO.

    – Islay
    2 days ago






  • 1





    I wonder if anyone attempted to use AI to solve this problem: teach a program how reset processes look like, where to find them looking at a webpage and how to submit the username/email to reset. If we are lucky this might work for a majority of websites and not an hardcoded list of less than 100.

    – Bakuriu
    yesterday








3




3





@emory I'm not sure that is true. An authenticated process would not expose a DoS threat to the process.

– schroeder
2 days ago





@emory I'm not sure that is true. An authenticated process would not expose a DoS threat to the process.

– schroeder
2 days ago




2




2





As I understand it, OP wants to send a message to a bunch of sites - facebook, google, spotify, netflex, etc - saying "hey, I am pretty sure I have an account with you guys and my username is op@somedomain.com. This account has been compromised. Please lock me out." Why couldn't I do the same with all the email addresses that I know @schroeder to use?

– emory
2 days ago





As I understand it, OP wants to send a message to a bunch of sites - facebook, google, spotify, netflex, etc - saying "hey, I am pretty sure I have an account with you guys and my username is op@somedomain.com. This account has been compromised. Please lock me out." Why couldn't I do the same with all the email addresses that I know @schroeder to use?

– emory
2 days ago




7




7





@emory .... because that would be silly. And no one is talking about that. And that has nothing to do with anything I said or what the OP said.

– schroeder
2 days ago





@emory .... because that would be silly. And no one is talking about that. And that has nothing to do with anything I said or what the OP said.

– schroeder
2 days ago




2




2





@emory I still have access to the old email account, so schroeder's idea of an authenticated process to trigger the requests seems to mitigate the issue IMO.

– Islay
2 days ago





@emory I still have access to the old email account, so schroeder's idea of an authenticated process to trigger the requests seems to mitigate the issue IMO.

– Islay
2 days ago




1




1





I wonder if anyone attempted to use AI to solve this problem: teach a program how reset processes look like, where to find them looking at a webpage and how to submit the username/email to reset. If we are lucky this might work for a majority of websites and not an hardcoded list of less than 100.

– Bakuriu
yesterday





I wonder if anyone attempted to use AI to solve this problem: teach a program how reset processes look like, where to find them looking at a webpage and how to submit the username/email to reset. If we are lucky this might work for a majority of websites and not an hardcoded list of less than 100.

– Bakuriu
yesterday











5














One tip to help you out on your journey is that multiple sites have recently implemented the "well-known password change URL". This is something you can plug in to any (supporting) website that redirects to the page that lets you change your password.



Take the homepage of the site, and add /.well-known/change-password to the end. Examples:



accounts.google.com/.well-known/change-password
-> https://myaccount.google.com/signinoptions/password

github.com/.well-known/change-password
-> https://github.com/settings/admin

twitter.com/.well-known/change-password
-> https://twitter.com/settings/password

meta.discourse.org/.well-known/change-password
-> https://meta.discourse.org/my/preferences/account





share|improve this answer
























  • I had never heard of those. Is it trying to append itself to this list?

    – Michael
    1 hour ago
















5














One tip to help you out on your journey is that multiple sites have recently implemented the "well-known password change URL". This is something you can plug in to any (supporting) website that redirects to the page that lets you change your password.



Take the homepage of the site, and add /.well-known/change-password to the end. Examples:



accounts.google.com/.well-known/change-password
-> https://myaccount.google.com/signinoptions/password

github.com/.well-known/change-password
-> https://github.com/settings/admin

twitter.com/.well-known/change-password
-> https://twitter.com/settings/password

meta.discourse.org/.well-known/change-password
-> https://meta.discourse.org/my/preferences/account





share|improve this answer
























  • I had never heard of those. Is it trying to append itself to this list?

    – Michael
    1 hour ago














5












5








5







One tip to help you out on your journey is that multiple sites have recently implemented the "well-known password change URL". This is something you can plug in to any (supporting) website that redirects to the page that lets you change your password.



Take the homepage of the site, and add /.well-known/change-password to the end. Examples:



accounts.google.com/.well-known/change-password
-> https://myaccount.google.com/signinoptions/password

github.com/.well-known/change-password
-> https://github.com/settings/admin

twitter.com/.well-known/change-password
-> https://twitter.com/settings/password

meta.discourse.org/.well-known/change-password
-> https://meta.discourse.org/my/preferences/account





share|improve this answer













One tip to help you out on your journey is that multiple sites have recently implemented the "well-known password change URL". This is something you can plug in to any (supporting) website that redirects to the page that lets you change your password.



Take the homepage of the site, and add /.well-known/change-password to the end. Examples:



accounts.google.com/.well-known/change-password
-> https://myaccount.google.com/signinoptions/password

github.com/.well-known/change-password
-> https://github.com/settings/admin

twitter.com/.well-known/change-password
-> https://twitter.com/settings/password

meta.discourse.org/.well-known/change-password
-> https://meta.discourse.org/my/preferences/account






share|improve this answer












share|improve this answer



share|improve this answer










answered 21 hours ago









RikingRiking

23418




23418













  • I had never heard of those. Is it trying to append itself to this list?

    – Michael
    1 hour ago



















  • I had never heard of those. Is it trying to append itself to this list?

    – Michael
    1 hour ago

















I had never heard of those. Is it trying to append itself to this list?

– Michael
1 hour ago





I had never heard of those. Is it trying to append itself to this list?

– Michael
1 hour ago











4














One alternative solution to identify sites that you used your email address on is to look into your browser's saved passwords.



This will allow you to see every site you have saved passwords for in your browser which might help you identify ones that need to be changed.



Obviously, this only works if you use the browser's "save password" feature.






share|improve this answer










New contributor




Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 2





    So, in other words, look in your password manager. And sometimes, your password manager is your browser.

    – schroeder
    2 days ago






  • 6





    True, although I think most people would not consider their browser a true "password manager". This is just another suggestion that could be easy to overlook for others who are trying to find websites they forgot they registered on

    – Jacob
    2 days ago






  • 1





    I would say "almost allways, your browser is your password manager."

    – ThoriumBR
    2 days ago
















4














One alternative solution to identify sites that you used your email address on is to look into your browser's saved passwords.



This will allow you to see every site you have saved passwords for in your browser which might help you identify ones that need to be changed.



Obviously, this only works if you use the browser's "save password" feature.






share|improve this answer










New contributor




Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 2





    So, in other words, look in your password manager. And sometimes, your password manager is your browser.

    – schroeder
    2 days ago






  • 6





    True, although I think most people would not consider their browser a true "password manager". This is just another suggestion that could be easy to overlook for others who are trying to find websites they forgot they registered on

    – Jacob
    2 days ago






  • 1





    I would say "almost allways, your browser is your password manager."

    – ThoriumBR
    2 days ago














4












4








4







One alternative solution to identify sites that you used your email address on is to look into your browser's saved passwords.



This will allow you to see every site you have saved passwords for in your browser which might help you identify ones that need to be changed.



Obviously, this only works if you use the browser's "save password" feature.






share|improve this answer










New contributor




Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.










One alternative solution to identify sites that you used your email address on is to look into your browser's saved passwords.



This will allow you to see every site you have saved passwords for in your browser which might help you identify ones that need to be changed.



Obviously, this only works if you use the browser's "save password" feature.







share|improve this answer










New contributor




Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this answer



share|improve this answer








edited 2 days ago









schroeder

78.5k30174210




78.5k30174210






New contributor




Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









answered 2 days ago









JacobJacob

411




411




New contributor




Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Jacob is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.








  • 2





    So, in other words, look in your password manager. And sometimes, your password manager is your browser.

    – schroeder
    2 days ago






  • 6





    True, although I think most people would not consider their browser a true "password manager". This is just another suggestion that could be easy to overlook for others who are trying to find websites they forgot they registered on

    – Jacob
    2 days ago






  • 1





    I would say "almost allways, your browser is your password manager."

    – ThoriumBR
    2 days ago














  • 2





    So, in other words, look in your password manager. And sometimes, your password manager is your browser.

    – schroeder
    2 days ago






  • 6





    True, although I think most people would not consider their browser a true "password manager". This is just another suggestion that could be easy to overlook for others who are trying to find websites they forgot they registered on

    – Jacob
    2 days ago






  • 1





    I would say "almost allways, your browser is your password manager."

    – ThoriumBR
    2 days ago








2




2





So, in other words, look in your password manager. And sometimes, your password manager is your browser.

– schroeder
2 days ago





So, in other words, look in your password manager. And sometimes, your password manager is your browser.

– schroeder
2 days ago




6




6





True, although I think most people would not consider their browser a true "password manager". This is just another suggestion that could be easy to overlook for others who are trying to find websites they forgot they registered on

– Jacob
2 days ago





True, although I think most people would not consider their browser a true "password manager". This is just another suggestion that could be easy to overlook for others who are trying to find websites they forgot they registered on

– Jacob
2 days ago




1




1





I would say "almost allways, your browser is your password manager."

– ThoriumBR
2 days ago





I would say "almost allways, your browser is your password manager."

– ThoriumBR
2 days ago











2














It's a hard problem because the top list of websites is so personal... And what you have to lose is in no way proportional to the site's popularity on any index of popular sites.



And only you know where you might have accounts.



For instance, I consider gaming sites to be more critical than banking sites. Because there are much fewer controls and less legal peril involved in hacking MMO gaming accounts, so they are the darlings of crackers. On the other hand, if you're done with Maplestory, you may not care.



But you certainly don't need to care about your Eve Online account if you definitely never played it. Only you know this sort of thing.



If you think you might have used a site in the past, why not just try your old credential?



Why not just spam every website with password reset requests?



They're not going to cooperate with large scale automated requests of this type.



First, the website acknowledging whether an email has an account, would empower spear phishing. Scammer gets a billion emails (easy enough), they start banging the website's password reset to learn "does this email have an account here, or not?" Now they have a list of 1 million emails that do. Now they start spear-phishing those known account holders. Put them on a daily newsletter where unsubscribe requires a login, that kind of thing. This is a "many email addresses against a single site" attack. The site's best defense is to add friction to the password reset process, e.g. a CAPTCHA, or simply design the password-reset process so it tells the inquirer nothing about whether an account exists. This is even more important for sites like Ashley Madison or Furries where having an account there could be embarrassing.



Second, if a cracker managed to gain control of an email, they could simply do exactly what you're trying to do - ascertain which websites this email has an account on. With a full dossier, they can then attack those sites or simply sell the credentials for more than they could otherwise. This is a "single email vs many sites" attack. In this case, the site needs to control one-off access to the password reset function - something like a CAPTCHA is called for. And 2-factor authentication - but again, this 2FA must not disclose to the casual inquirer whether an account here exists.



Because of this, I don't see a probability of anyone writing an app to do this. The writer would find herself in a hacking "arms race" with many companies trying to stop her automation from working.






share|improve this answer
























  • Lol...You made me google Furries and Ashley Madison...

    – Aganju
    2 days ago













  • The spear phishing/email enumeration isn't an issue if the mass password reset process itself requires email verification. However, good point re if a cracker managed to gain control of an email.... But then, in the case of a determined attacker, whether the manual nature of the process is enough of a deterrent - compared to the convenience afforded by its automation to genuine users - is debatable.

    – Islay
    yesterday


















2














It's a hard problem because the top list of websites is so personal... And what you have to lose is in no way proportional to the site's popularity on any index of popular sites.



And only you know where you might have accounts.



For instance, I consider gaming sites to be more critical than banking sites. Because there are much fewer controls and less legal peril involved in hacking MMO gaming accounts, so they are the darlings of crackers. On the other hand, if you're done with Maplestory, you may not care.



But you certainly don't need to care about your Eve Online account if you definitely never played it. Only you know this sort of thing.



If you think you might have used a site in the past, why not just try your old credential?



Why not just spam every website with password reset requests?



They're not going to cooperate with large scale automated requests of this type.



First, the website acknowledging whether an email has an account, would empower spear phishing. Scammer gets a billion emails (easy enough), they start banging the website's password reset to learn "does this email have an account here, or not?" Now they have a list of 1 million emails that do. Now they start spear-phishing those known account holders. Put them on a daily newsletter where unsubscribe requires a login, that kind of thing. This is a "many email addresses against a single site" attack. The site's best defense is to add friction to the password reset process, e.g. a CAPTCHA, or simply design the password-reset process so it tells the inquirer nothing about whether an account exists. This is even more important for sites like Ashley Madison or Furries where having an account there could be embarrassing.



Second, if a cracker managed to gain control of an email, they could simply do exactly what you're trying to do - ascertain which websites this email has an account on. With a full dossier, they can then attack those sites or simply sell the credentials for more than they could otherwise. This is a "single email vs many sites" attack. In this case, the site needs to control one-off access to the password reset function - something like a CAPTCHA is called for. And 2-factor authentication - but again, this 2FA must not disclose to the casual inquirer whether an account here exists.



Because of this, I don't see a probability of anyone writing an app to do this. The writer would find herself in a hacking "arms race" with many companies trying to stop her automation from working.






share|improve this answer
























  • Lol...You made me google Furries and Ashley Madison...

    – Aganju
    2 days ago













  • The spear phishing/email enumeration isn't an issue if the mass password reset process itself requires email verification. However, good point re if a cracker managed to gain control of an email.... But then, in the case of a determined attacker, whether the manual nature of the process is enough of a deterrent - compared to the convenience afforded by its automation to genuine users - is debatable.

    – Islay
    yesterday
















2












2








2







It's a hard problem because the top list of websites is so personal... And what you have to lose is in no way proportional to the site's popularity on any index of popular sites.



And only you know where you might have accounts.



For instance, I consider gaming sites to be more critical than banking sites. Because there are much fewer controls and less legal peril involved in hacking MMO gaming accounts, so they are the darlings of crackers. On the other hand, if you're done with Maplestory, you may not care.



But you certainly don't need to care about your Eve Online account if you definitely never played it. Only you know this sort of thing.



If you think you might have used a site in the past, why not just try your old credential?



Why not just spam every website with password reset requests?



They're not going to cooperate with large scale automated requests of this type.



First, the website acknowledging whether an email has an account, would empower spear phishing. Scammer gets a billion emails (easy enough), they start banging the website's password reset to learn "does this email have an account here, or not?" Now they have a list of 1 million emails that do. Now they start spear-phishing those known account holders. Put them on a daily newsletter where unsubscribe requires a login, that kind of thing. This is a "many email addresses against a single site" attack. The site's best defense is to add friction to the password reset process, e.g. a CAPTCHA, or simply design the password-reset process so it tells the inquirer nothing about whether an account exists. This is even more important for sites like Ashley Madison or Furries where having an account there could be embarrassing.



Second, if a cracker managed to gain control of an email, they could simply do exactly what you're trying to do - ascertain which websites this email has an account on. With a full dossier, they can then attack those sites or simply sell the credentials for more than they could otherwise. This is a "single email vs many sites" attack. In this case, the site needs to control one-off access to the password reset function - something like a CAPTCHA is called for. And 2-factor authentication - but again, this 2FA must not disclose to the casual inquirer whether an account here exists.



Because of this, I don't see a probability of anyone writing an app to do this. The writer would find herself in a hacking "arms race" with many companies trying to stop her automation from working.






share|improve this answer













It's a hard problem because the top list of websites is so personal... And what you have to lose is in no way proportional to the site's popularity on any index of popular sites.



And only you know where you might have accounts.



For instance, I consider gaming sites to be more critical than banking sites. Because there are much fewer controls and less legal peril involved in hacking MMO gaming accounts, so they are the darlings of crackers. On the other hand, if you're done with Maplestory, you may not care.



But you certainly don't need to care about your Eve Online account if you definitely never played it. Only you know this sort of thing.



If you think you might have used a site in the past, why not just try your old credential?



Why not just spam every website with password reset requests?



They're not going to cooperate with large scale automated requests of this type.



First, the website acknowledging whether an email has an account, would empower spear phishing. Scammer gets a billion emails (easy enough), they start banging the website's password reset to learn "does this email have an account here, or not?" Now they have a list of 1 million emails that do. Now they start spear-phishing those known account holders. Put them on a daily newsletter where unsubscribe requires a login, that kind of thing. This is a "many email addresses against a single site" attack. The site's best defense is to add friction to the password reset process, e.g. a CAPTCHA, or simply design the password-reset process so it tells the inquirer nothing about whether an account exists. This is even more important for sites like Ashley Madison or Furries where having an account there could be embarrassing.



Second, if a cracker managed to gain control of an email, they could simply do exactly what you're trying to do - ascertain which websites this email has an account on. With a full dossier, they can then attack those sites or simply sell the credentials for more than they could otherwise. This is a "single email vs many sites" attack. In this case, the site needs to control one-off access to the password reset function - something like a CAPTCHA is called for. And 2-factor authentication - but again, this 2FA must not disclose to the casual inquirer whether an account here exists.



Because of this, I don't see a probability of anyone writing an app to do this. The writer would find herself in a hacking "arms race" with many companies trying to stop her automation from working.







share|improve this answer












share|improve this answer



share|improve this answer










answered 2 days ago









HarperHarper

2,030413




2,030413













  • Lol...You made me google Furries and Ashley Madison...

    – Aganju
    2 days ago













  • The spear phishing/email enumeration isn't an issue if the mass password reset process itself requires email verification. However, good point re if a cracker managed to gain control of an email.... But then, in the case of a determined attacker, whether the manual nature of the process is enough of a deterrent - compared to the convenience afforded by its automation to genuine users - is debatable.

    – Islay
    yesterday





















  • Lol...You made me google Furries and Ashley Madison...

    – Aganju
    2 days ago













  • The spear phishing/email enumeration isn't an issue if the mass password reset process itself requires email verification. However, good point re if a cracker managed to gain control of an email.... But then, in the case of a determined attacker, whether the manual nature of the process is enough of a deterrent - compared to the convenience afforded by its automation to genuine users - is debatable.

    – Islay
    yesterday



















Lol...You made me google Furries and Ashley Madison...

– Aganju
2 days ago







Lol...You made me google Furries and Ashley Madison...

– Aganju
2 days ago















The spear phishing/email enumeration isn't an issue if the mass password reset process itself requires email verification. However, good point re if a cracker managed to gain control of an email.... But then, in the case of a determined attacker, whether the manual nature of the process is enough of a deterrent - compared to the convenience afforded by its automation to genuine users - is debatable.

– Islay
yesterday







The spear phishing/email enumeration isn't an issue if the mass password reset process itself requires email verification. However, good point re if a cracker managed to gain control of an email.... But then, in the case of a determined attacker, whether the manual nature of the process is enough of a deterrent - compared to the convenience afforded by its automation to genuine users - is debatable.

– Islay
yesterday













-1














You can absolutely reset passwords automatically if your password manager supports it (I use LastPass) -- even retroactively. You don't have to have created the site using LastPass in order for it to be able to reset your passwords for you. You simply have to load the credentials into it and ask it to perform the password reset function.



In LastPass, simply allow LastPass to remember your credentials for the site (typically by logging in), and then on the Edit Site window of your vault, simply select Auto Change Password below the password field.






share|improve this answer








New contributor




bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





















  • One may not have the old password(s) anymore to load into LastPass.

    – Islay
    2 days ago











  • Lastpasses feature also only works on some of the biggest sites, and even then not reliably. (facebook, battle.net....)

    – Lichtbringer
    2 days ago











  • This is all covered in another answer (along with the weaknesses)

    – schroeder
    yesterday
















-1














You can absolutely reset passwords automatically if your password manager supports it (I use LastPass) -- even retroactively. You don't have to have created the site using LastPass in order for it to be able to reset your passwords for you. You simply have to load the credentials into it and ask it to perform the password reset function.



In LastPass, simply allow LastPass to remember your credentials for the site (typically by logging in), and then on the Edit Site window of your vault, simply select Auto Change Password below the password field.






share|improve this answer








New contributor




bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





















  • One may not have the old password(s) anymore to load into LastPass.

    – Islay
    2 days ago











  • Lastpasses feature also only works on some of the biggest sites, and even then not reliably. (facebook, battle.net....)

    – Lichtbringer
    2 days ago











  • This is all covered in another answer (along with the weaknesses)

    – schroeder
    yesterday














-1












-1








-1







You can absolutely reset passwords automatically if your password manager supports it (I use LastPass) -- even retroactively. You don't have to have created the site using LastPass in order for it to be able to reset your passwords for you. You simply have to load the credentials into it and ask it to perform the password reset function.



In LastPass, simply allow LastPass to remember your credentials for the site (typically by logging in), and then on the Edit Site window of your vault, simply select Auto Change Password below the password field.






share|improve this answer








New contributor




bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.










You can absolutely reset passwords automatically if your password manager supports it (I use LastPass) -- even retroactively. You don't have to have created the site using LastPass in order for it to be able to reset your passwords for you. You simply have to load the credentials into it and ask it to perform the password reset function.



In LastPass, simply allow LastPass to remember your credentials for the site (typically by logging in), and then on the Edit Site window of your vault, simply select Auto Change Password below the password field.







share|improve this answer








New contributor




bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this answer



share|improve this answer






New contributor




bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









answered 2 days ago









bvoyelrbvoyelr

107




107




New contributor




bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






bvoyelr is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.













  • One may not have the old password(s) anymore to load into LastPass.

    – Islay
    2 days ago











  • Lastpasses feature also only works on some of the biggest sites, and even then not reliably. (facebook, battle.net....)

    – Lichtbringer
    2 days ago











  • This is all covered in another answer (along with the weaknesses)

    – schroeder
    yesterday



















  • One may not have the old password(s) anymore to load into LastPass.

    – Islay
    2 days ago











  • Lastpasses feature also only works on some of the biggest sites, and even then not reliably. (facebook, battle.net....)

    – Lichtbringer
    2 days ago











  • This is all covered in another answer (along with the weaknesses)

    – schroeder
    yesterday

















One may not have the old password(s) anymore to load into LastPass.

– Islay
2 days ago





One may not have the old password(s) anymore to load into LastPass.

– Islay
2 days ago













Lastpasses feature also only works on some of the biggest sites, and even then not reliably. (facebook, battle.net....)

– Lichtbringer
2 days ago





Lastpasses feature also only works on some of the biggest sites, and even then not reliably. (facebook, battle.net....)

– Lichtbringer
2 days ago













This is all covered in another answer (along with the weaknesses)

– schroeder
yesterday





This is all covered in another answer (along with the weaknesses)

– schroeder
yesterday


















draft saved

draft discarded




















































Thanks for contributing an answer to Information Security Stack Exchange!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f206218%2fhow-do-i-reset-passwords-on-multiple-websites-easily%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Bundesstraße 106

Verónica Boquete

Ida-Boy-Ed-Garten