1 00:00:00,170 --> 00:00:03,440 There are two ways to access data from leaked databases. 2 00:00:03,470 --> 00:00:10,430 The first way is by using websites like hashed, Intel Xe snort space, which you have already learned 3 00:00:10,430 --> 00:00:11,720 in previous lectures. 4 00:00:11,720 --> 00:00:18,470 The second way is by downloading the databases manually on your virtual machine, which you will learn 5 00:00:18,470 --> 00:00:20,000 in upcoming lectures. 6 00:00:20,810 --> 00:00:26,210 For now, we are going to download and install the necessary software on your virtual machine. 7 00:00:26,210 --> 00:00:30,620 So to manually download leaked databases you will need two programs. 8 00:00:30,620 --> 00:00:36,080 The first one is torrent to download the database and the second one is agent Transact that will allow 9 00:00:36,080 --> 00:00:39,470 you to search for data within the leaked database. 10 00:00:39,500 --> 00:00:48,380 In addition to that, you need a large disk space because there are some databases that are 50 or 80GB. 11 00:00:48,380 --> 00:00:54,530 So in my opinion, if I would like to download largest data leaks like Facebook data leak, Twitter 12 00:00:54,530 --> 00:00:59,210 or LinkedIn, I need a disk space between 100 and 500GB. 13 00:00:59,210 --> 00:01:06,110 And I think that possessing a leaked or abridged database is way more affordable than having subscription, 14 00:01:06,110 --> 00:01:12,290 because you only have to have the database once, and then you can access it at any time you want to 15 00:01:12,320 --> 00:01:16,550 search for one or multiple persons within this leaked database. 16 00:01:17,270 --> 00:01:20,390 So the first software we need is called Utorrent. 17 00:01:20,390 --> 00:01:23,150 That will allow us to download the lake databases. 18 00:01:23,150 --> 00:01:26,090 So to download it all you have to do is just to go to Utorrent. 19 00:01:26,090 --> 00:01:29,120 Com and then click on Free Download. 20 00:01:29,570 --> 00:01:32,240 And I'm going to download the free version. 21 00:01:32,240 --> 00:01:33,590 So I'm going to click on here. 22 00:01:33,590 --> 00:01:35,570 And then I'm going to wait a little bit. 23 00:01:35,570 --> 00:01:37,820 And now it's downloaded. 24 00:01:38,480 --> 00:01:39,860 So let me click on it. 25 00:01:39,890 --> 00:01:41,360 I'm going to say yes. 26 00:01:42,770 --> 00:01:46,670 And now next agree. 27 00:01:46,970 --> 00:01:48,650 And I would like to skip. 28 00:01:48,650 --> 00:01:52,790 All because I don't want to download any other software with Utorrent. 29 00:01:52,790 --> 00:01:57,350 So I'm going to say skip all and then wait until it's downloaded. 30 00:01:58,820 --> 00:02:01,070 So now I'm going to click on finish. 31 00:02:02,240 --> 00:02:05,210 And here is the web interface of Utorrent. 32 00:02:05,450 --> 00:02:11,900 The second software that you need is a program like agent Ransac that will allow you to search within 33 00:02:11,900 --> 00:02:14,270 one or multiple files. 34 00:02:14,420 --> 00:02:16,820 So I'm going to click on download. 35 00:02:17,120 --> 00:02:20,030 And then the installer is going to start downloading. 36 00:02:20,030 --> 00:02:23,030 And now once it's downloaded I'm going to run it. 37 00:02:24,590 --> 00:02:31,520 And then I'm going to say next accept next and the next and install. 38 00:02:32,660 --> 00:02:34,250 And now we'll say yes. 39 00:02:37,970 --> 00:02:40,280 And now I'm going to say finish. 40 00:02:41,120 --> 00:02:46,670 So now we have Utorrent and Agent Ransac installed on our computer. 41 00:02:46,670 --> 00:02:53,090 And we are going to use both of them in the next lecture to download and search within a leaked database.