1 00:00:00,200 --> 00:00:04,310 Let's come back to searching within leaked databases. 2 00:00:04,550 --> 00:00:11,060 When I have someone's email address, I always like to go to a website like Hawaii Pinpoint and then 3 00:00:11,060 --> 00:00:17,750 add the email and see whether this email address is found within a leaked or breached database. 4 00:00:18,230 --> 00:00:25,400 Because if an email address was found in a data breach, then I can go and download this data leak or 5 00:00:25,400 --> 00:00:29,240 data breach and then search for this person's email address. 6 00:00:29,270 --> 00:00:33,230 And sometimes you will be able to find some additional information. 7 00:00:33,230 --> 00:00:39,350 For example, you might be able to find their date of birth, their full name, their phone number, 8 00:00:39,380 --> 00:00:41,540 or any additional information. 9 00:00:42,140 --> 00:00:48,110 And if you were able to find someone's phone number within a data leak or a data breach, then you can 10 00:00:48,110 --> 00:00:54,230 apply the Osint methods that you are going to learn in the next section to gather more information about 11 00:00:54,230 --> 00:00:55,100 the target. 12 00:00:56,180 --> 00:01:02,360 So the first step is always to identify the data breaches or data leaks that are associated with an 13 00:01:02,360 --> 00:01:03,350 email address. 14 00:01:04,010 --> 00:01:11,560 And then you want to go and download the data breach or data leak, or use a service like Intel or the 15 00:01:11,590 --> 00:01:18,370 hashed, and once you download the leaked or breached database, then you want to go and search for 16 00:01:18,370 --> 00:01:25,240 this person's email within the database and see whether there are any additional information that might 17 00:01:25,240 --> 00:01:27,970 help you to gather more information about the target. 18 00:01:28,510 --> 00:01:36,160 So let's go to Haveibeenpwned and copy Rishi Kabra email address and then put it in here. 19 00:01:36,160 --> 00:01:41,470 And then click on pond and see the data breaches that were found. 20 00:01:41,530 --> 00:01:44,680 So we can see that we have nine data breaches. 21 00:01:44,890 --> 00:01:50,920 And this will not only show me in which data breach this email address has been found, but this will 22 00:01:50,920 --> 00:01:55,150 also reveal some information about Rishi Kabra. 23 00:01:55,180 --> 00:02:02,470 For example, we know that he uses this website to listen to music and we can also know that he has 24 00:02:02,470 --> 00:02:07,090 ordered from BigBasket, which is a grocery store in India. 25 00:02:07,090 --> 00:02:12,220 So this will tell us that he either lives in India or has visited India. 26 00:02:13,090 --> 00:02:20,810 We can also scroll down and see that he has a Domino's India your account, and I assume that he has 27 00:02:20,810 --> 00:02:22,400 ordered from this restaurant. 28 00:02:22,400 --> 00:02:28,370 And if we were able to download this database, then we'd be able to find email addresses, names, 29 00:02:28,370 --> 00:02:32,480 phone numbers, physical addresses and what they have bought. 30 00:02:33,110 --> 00:02:39,530 He also has a Gravatar account, Gfet account, which is a workout tracking app. 31 00:02:39,530 --> 00:02:44,690 So this will tell us that he is working out and he is using this app. 32 00:02:45,500 --> 00:02:51,980 And he has an account on rental mojo, so we might be able to find some information about him like his 33 00:02:51,980 --> 00:02:57,350 passport numbers, social media profiles, government issued IDs, etc.. 34 00:02:57,380 --> 00:03:03,260 Now we don't know whether he has rented an apartment or not, but we know that he has an account on 35 00:03:03,260 --> 00:03:07,640 this website, and we can see here that he has an account on Tongal. 36 00:03:07,820 --> 00:03:10,970 And this is a global online gaming network. 37 00:03:10,970 --> 00:03:13,520 So we know that he already play games. 38 00:03:13,520 --> 00:03:18,800 We don't know whether he currently plays games, but we know that he had played games because we have 39 00:03:18,800 --> 00:03:23,060 seen this on his Twitch channel and on his YouTube channel. 40 00:03:23,960 --> 00:03:31,090 Now, if you work with law enforcement, sometimes you don't have to go out there and download the database 41 00:03:31,090 --> 00:03:36,160 or data leak, because some websites will give you the person's information. 42 00:03:36,160 --> 00:03:42,970 Once you, as a person who works with law enforcement, asked for this information because sometimes 43 00:03:42,970 --> 00:03:47,650 they are obligated to give you this information if there is any open case. 44 00:03:47,950 --> 00:03:52,870 But if you are a private investigator, then you can download the database or data leak. 45 00:03:52,870 --> 00:03:59,560 If this is not illegal in your country, and then search for this person's information within this database. 46 00:03:59,560 --> 00:04:04,930 So in this video, you have learned how you can check whether an email address has been found in a data 47 00:04:04,930 --> 00:04:06,730 breach or a data leak. 48 00:04:06,730 --> 00:04:10,570 And if it was found in a data breach or a data leak. 49 00:04:10,600 --> 00:04:17,590 This means that this person has an account on this website that has been breached, which might tell 50 00:04:17,590 --> 00:04:20,980 you about the person's personality, likes and dislikes. 51 00:04:20,980 --> 00:04:28,600 And in addition to that, you can go and download the database and search for the person's email address 52 00:04:28,600 --> 00:04:34,810 and find any additional information about the person, for example, date of birth, phone number, 53 00:04:34,810 --> 00:04:37,120 physical address, etc..