1 00:00:00,140 --> 00:00:06,830 In this lecture, I would like to show you how can you search for leaked databases that are publicly 2 00:00:06,830 --> 00:00:08,720 available on the internet? 3 00:00:09,560 --> 00:00:16,310 Now we are going to use a very simple search operator that will help us to find these databases. 4 00:00:16,340 --> 00:00:21,530 And as I said before, there are multiple methods to access leaked databases. 5 00:00:21,530 --> 00:00:29,120 You can either have a subscription and search very simply on the hashed intelligence X, etc. or you 6 00:00:29,120 --> 00:00:35,510 can download the leaked database on your computer or on your virtual machine, because we do not know 7 00:00:35,510 --> 00:00:37,340 what is in these files. 8 00:00:37,340 --> 00:00:40,130 That's why I highly recommend you use a virtual machine. 9 00:00:40,130 --> 00:00:46,820 And if you don't want to use a virtual machine because it's slow, I recommend you have a dedicated 10 00:00:46,820 --> 00:00:55,280 machine or a computer that is connected to a separate network that you use to download leaked databases, 11 00:00:55,340 --> 00:01:01,280 but for now, we are going to rely on our virtual machine to download and search within these leaked 12 00:01:01,280 --> 00:01:02,300 databases. 13 00:01:02,510 --> 00:01:05,940 So the search operator is going to be as follows. 14 00:01:05,940 --> 00:01:10,530 So I'm going to type for example the database name. 15 00:01:10,530 --> 00:01:17,850 So let me say that I'm searching for 000 web host which is also a website that has been hacked. 16 00:01:17,850 --> 00:01:22,140 And then I'm going to say.com and then dot seven z. 17 00:01:22,740 --> 00:01:25,980 And then I'm going to close it with a quotation mark. 18 00:01:25,980 --> 00:01:30,300 And then I can say leak for example and download. 19 00:01:30,690 --> 00:01:36,630 And I'm also going to search for a magnet link and then hit enter. 20 00:01:37,170 --> 00:01:40,020 And this showed me nine search results. 21 00:01:40,530 --> 00:01:44,190 So we can see that there are multiple search results. 22 00:01:44,190 --> 00:01:48,480 I can open any link and download the database. 23 00:01:49,680 --> 00:01:56,460 Another resource that you can use to download a number of leaked databases is called size of dot cat. 24 00:01:56,460 --> 00:02:00,300 So you want to go to this link size of dot cat. 25 00:02:00,330 --> 00:02:05,610 And here you will see multiple links for multiple leaked or breached databases. 26 00:02:05,610 --> 00:02:11,600 We can see AMD and a database from Raidforums that contains multiple databases. 27 00:02:11,600 --> 00:02:19,040 So this database does not only contain one database, it actually contains all of these databases. 28 00:02:21,890 --> 00:02:26,900 We can also see that we have Ashley Madison data leak or data breach. 29 00:02:26,900 --> 00:02:29,000 We can download it using this link. 30 00:02:29,000 --> 00:02:34,220 And if this link didn't work then you can search for it using the method that I've talked about at the 31 00:02:34,220 --> 00:02:35,810 beginning of this lecture. 32 00:02:36,320 --> 00:02:40,850 Another thing that I would like to focus on is the size of the database. 33 00:02:40,850 --> 00:02:49,340 So here we can see that this database is 28GB and this one is around 270GB. 34 00:02:49,340 --> 00:02:57,620 And that's why I've said that you might need large disk space or multiple SSDs or hard drives to store 35 00:02:57,650 --> 00:02:59,030 huge databases. 36 00:02:59,030 --> 00:03:05,930 But in your case, you can start with the Facebook, Twitter or Snapchat data leaks and utilize them 37 00:03:05,930 --> 00:03:08,540 to search for someone's information.