1 00:00:00,170 --> 00:00:05,810 The last method that I would like to show you is how you can search in breached or leaked databases, 2 00:00:05,810 --> 00:00:11,270 and since you don't have the email address, this means that you cannot go to haveibeenpwned and check 3 00:00:11,270 --> 00:00:15,440 if an email address is found in a certain data breach or a data leak. 4 00:00:15,590 --> 00:00:20,810 And that's why I have showed you how to use the hashed, because the hashed allows you to search by 5 00:00:20,810 --> 00:00:24,260 phone number, full name, and other information. 6 00:00:24,650 --> 00:00:30,530 And this is something that we have done in a previous lecture when we have searched for data on hashed, 7 00:00:30,590 --> 00:00:35,450 and when we searched by his full name, we were able to get two email addresses. 8 00:00:35,450 --> 00:00:40,250 This is the first one and his business email address that is on his website. 9 00:00:40,820 --> 00:00:47,420 And after that we were able to find three passwords and we have searched for this unique password on 10 00:00:47,450 --> 00:00:48,440 the hashed again. 11 00:00:48,440 --> 00:00:53,180 And we're able to get additional email address that ends with gmail.com. 12 00:00:53,600 --> 00:00:59,540 So by using the hashed we were able to get three passwords and three email addresses, which is something 13 00:00:59,540 --> 00:01:01,820 that you have already learned in a previous lecture. 14 00:01:02,480 --> 00:01:05,120 Now let's say that you do not want to use the hashed. 15 00:01:05,120 --> 00:01:08,870 What you can do is just to gather basic information about the person. 16 00:01:08,870 --> 00:01:13,520 For example, if they have a Facebook account, LinkedIn account, or a Twitter account. 17 00:01:13,520 --> 00:01:19,310 And if they have these accounts, then you can download Facebook data leak, LinkedIn data breach and 18 00:01:19,310 --> 00:01:23,300 Twitter data leak and search within these data breaches or data leaks. 19 00:01:23,300 --> 00:01:26,270 And you might be able to find additional information. 20 00:01:26,270 --> 00:01:31,460 For example, if you have searched within the Facebook data leak, you might be able to find a phone 21 00:01:31,460 --> 00:01:32,060 number. 22 00:01:32,060 --> 00:01:38,510 And by having a phone number, you can perform additional Osint methods or techniques that you are going 23 00:01:38,510 --> 00:01:42,920 to learn in a future section to gather more information about the person. 24 00:01:43,520 --> 00:01:49,010 And if you were able to find someone's LinkedIn account and they had an old LinkedIn account, then 25 00:01:49,010 --> 00:01:53,150 you might be able to find their email address in the LinkedIn data breach. 26 00:01:53,810 --> 00:02:00,080 And lastly, if they have a Twitter account, then you can look within the 200 million Twitter profiles 27 00:02:00,080 --> 00:02:03,740 data leak and see if you can find their email addresses. 28 00:02:04,670 --> 00:02:08,330 So this is a very simple method to find someone's email address. 29 00:02:08,360 --> 00:02:14,120 It's not going to work all the time, but it is something that you can still use if you tried. 30 00:02:14,120 --> 00:02:19,220 All methods that I've talked about in this section and none of them has worked, you can still try it 31 00:02:19,220 --> 00:02:23,600 because you might be able to find the person email address.