I was looking for a way to do this, as a result of one of my passwords having been compromised. Thank-you to Thomas941, for the tip about the "Export" feature. This did, indeed, produce a plaintext document that has all the passwords visible. There was, however, the small issue of how to extract just the compromised sites from the rather long list, without having to go through it manually. Here is my solution to that dilemma. Note that this will only work on Mac OS X, Linux, and Unix; a different solution will be needed for Windows users. (Perhaps, someone with PowerShell knowledge can replicate what I've done in BASH?)
1. Save the exported passwords as "Export.html", on your Desktop. (The name and location of this file will be important, below.)
2. Open a Terminal window (on Mac, go to Finder > Applications > Utilities > Terminal).
3. Copy/paste this into the terminal and press ENTER:
- Code: Select All Code
/bin/bash
(Note: most Mac/Linux/Unix machines use the BASH interpreter by default, so you might be able to skip Step 3.)
4. Copy/paste this into the terminal and press ENTER:
- Code: Select All Code
cd ~/Desktop
5. Copy/paste this into the terminal and press ENTER:
- Code: Select All Code
read -sp "password: " pw ; grep "$pw" Export.html > pwned.txt ; echo
You will be prompted to enter the compromised password. Type it in, then press ENTER. Please note that nothing will appear on the screen as you type (for security). A list of sites where you used that password will be exported to a file called, "pwned.txt", on your Desktop. You can open this file with any text editor (on Mac, Text Wrangler, a free app from the App Store, is a good choice). You may now go through each affected site and change the password.
Hopefully, such a feature will be implemented in LastPass, so that we can avoid the above acrobatics, in the future.
