1 00:00:00,290 --> 00:00:03,350 Let's recap what we have learned in this section. 2 00:00:03,380 --> 00:00:10,790 The first thing that you always have to do is to collect all the usernames that you have found on different 3 00:00:10,790 --> 00:00:14,000 social media accounts or different online accounts. 4 00:00:14,030 --> 00:00:19,490 This will help you to focus on these usernames without you getting distracted. 5 00:00:19,880 --> 00:00:26,420 After you collect all the usernames, you can use search engines to search for these usernames, so 6 00:00:26,420 --> 00:00:32,750 you can use the internal search operator to see whether a certain username has been used in a certain 7 00:00:32,750 --> 00:00:35,930 URL that is indexed by search engines. 8 00:00:36,170 --> 00:00:42,950 Next, you can use people search engine or online tools to find additional accounts with the same username. 9 00:00:43,370 --> 00:00:49,700 So we have learned how we can use ID crawl to search by username to find some social media accounts 10 00:00:49,700 --> 00:00:56,300 that we were not aware of, and we have learned how we can use What's My Name and Blackbird to find 11 00:00:56,300 --> 00:00:59,300 more accounts that we didn't find before. 12 00:00:59,960 --> 00:01:04,160 And we will cover people's search engine in depth in the next section. 13 00:01:04,730 --> 00:01:10,940 And the last thing that you want to do is to search for this username in leaked databases. 14 00:01:10,940 --> 00:01:17,960 And once you identify in which data leak or data breach this username has been found, then you can 15 00:01:17,960 --> 00:01:24,410 either search for this username on the hashed, or you can download the database or the data leak and 16 00:01:24,410 --> 00:01:30,740 search for this username and find any additional information that are associated with this username.