1 00:00:00,140 --> 00:00:03,500 Let's recap what we have learned in this section. 2 00:00:03,620 --> 00:00:08,480 The first step is always to gather information about your target. 3 00:00:08,510 --> 00:00:14,210 You might be able to find their Facebook account, Twitter account, Snapchat account, or LinkedIn 4 00:00:14,210 --> 00:00:16,520 account, or any other account. 5 00:00:16,520 --> 00:00:24,320 And after you find these accounts, you might need to extract the profile ID or the member ID, which 6 00:00:24,320 --> 00:00:27,680 is something that you are going to learn in future sections. 7 00:00:28,610 --> 00:00:34,340 Next, you want to make sure to ask a lawyer or somebody that knows about the law. 8 00:00:34,370 --> 00:00:41,600 That could help you to know whether downloading or possessing leaked or breached databases is illegal 9 00:00:41,600 --> 00:00:43,280 in your country or not. 10 00:00:43,760 --> 00:00:50,210 Next, you want to make sure whether the email address or phone number that you have gathered is actually 11 00:00:50,210 --> 00:00:52,100 in a leak database or not. 12 00:00:52,130 --> 00:00:58,220 So you want to go to haveibeenpwned, enter the person's email address or phone number to find if their 13 00:00:58,220 --> 00:01:00,950 information are leaked online or not. 14 00:01:01,310 --> 00:01:07,280 And if their information are leaked, then you can either use an online service to search for someone's 15 00:01:07,280 --> 00:01:14,750 information within leaked databases like Dehacked, or you can download the leaked or breached database 16 00:01:14,750 --> 00:01:19,610 and then use it to search for this person's information in the database. 17 00:01:19,640 --> 00:01:26,270 Now, I have tried my best to blur or hide people's sensitive information because I don't want to expose 18 00:01:26,270 --> 00:01:34,010 the online information, but these information are already publicly available and anyone can download 19 00:01:34,040 --> 00:01:42,140 them and either use them for good or use them for bad, like spamming or doxing, etc. and I hope that 20 00:01:42,140 --> 00:01:47,480 the information that you have learned from this section and from this course are going to be used for 21 00:01:47,480 --> 00:01:48,140 good.