Update: check out LeakedIn for a much easier way to see if your password was part of the leak, as well as if it has already been cracked.

This assumes you’ve already downloaded the 118MB list of password SHA1’s. I’d link to the source I found but it has already been removed. (No, I’m not going to share mine – sorry).  This also assumes you’re on a Mac or linux box with OpenSSL installed.

Create a text file called password_file.txt.  Type your password into this file and save. Be sure not to include any spaces or new lines, just your password.

Open up a terminal and type the following, replacing “/path/to/” with the actual path to the password_file.txt file:

openssl sha1 /path/to/password_file.txt

You’ll get output simliar to this:

SHA1(password_file.txt)= da39a3ee5e6b4b0d3255bfef95601890afd80709

Copy that long string of text after the equals sign. Search for it in the list of SHA1’s, and if you find a match then your password was part of the hack. You should change your password for any accounts using that password immediately.

Also don’t forget to delete that file after generating the SHA1!