1 00:00:00,140 --> 00:00:01,100 The last. 2 00:00:01,100 --> 00:00:07,970 And my favorite method that I would like to show you is to search within leaked or breached databases. 3 00:00:08,390 --> 00:00:14,480 The reason why I like this method is that there are tons of information that you can find in leaked 4 00:00:14,480 --> 00:00:20,960 databases, so you will not only be able to find someone's email address or password, but you will 5 00:00:20,960 --> 00:00:27,260 also find phone numbers, physical addresses, and sometimes social security number. 6 00:00:27,440 --> 00:00:31,220 But in our case, you are only searching for a phone number. 7 00:00:31,970 --> 00:00:36,560 You can always search by name, email address and password. 8 00:00:36,560 --> 00:00:41,510 So even if you don't have someone's email address, you can always search by name. 9 00:00:42,080 --> 00:00:46,940 And if you manage to find someone's email address, then you can search for this email address in a 10 00:00:46,940 --> 00:00:52,760 certain data breach and find all the information that are associated with this account. 11 00:00:53,570 --> 00:00:59,600 And if you have managed to get someone's password by using the hashed, for example, as what we have 12 00:00:59,600 --> 00:01:07,220 done in a previous section, then you can search for this unique password in the hashed or in databases 13 00:01:07,220 --> 00:01:14,450 to see whether this password is associated to a certain phone number or to a certain email. 14 00:01:14,630 --> 00:01:19,790 And even if you weren't able to get the person's phone number, you will have their email. 15 00:01:19,790 --> 00:01:25,700 And by having their emails, you can search for the person's email address in linked databases and find 16 00:01:25,700 --> 00:01:29,900 whether there is any phone number associated with this email address. 17 00:01:30,620 --> 00:01:32,210 Now to show you what I mean. 18 00:01:32,210 --> 00:01:39,110 If you were able to get someone's email address, then you can go to haveibeenpwned and see whether 19 00:01:39,110 --> 00:01:42,140 this email address has been leaked or not. 20 00:01:42,290 --> 00:01:48,320 And if it was found in a data breach or a data leak, then you can check all the data breaches and find 21 00:01:48,350 --> 00:01:50,660 whether there are any additional information. 22 00:01:52,220 --> 00:01:57,650 Now let's say that you don't have someone's email address, so you cannot go to Haveibeenpwned and add 23 00:01:57,650 --> 00:02:01,430 the person's email address and find whether it's leaked or not because you don't have it. 24 00:02:01,460 --> 00:02:07,160 Even after trying all the methods that I've talked about, then you can go to the hashed and search 25 00:02:07,160 --> 00:02:13,910 by name so you can add the person's name, John Smith, for example, and find all the data leaks that 26 00:02:13,910 --> 00:02:15,890 contain the name John Smith. 27 00:02:15,920 --> 00:02:18,710 In our case, we can search for Rishi Kabra. 28 00:02:18,830 --> 00:02:24,670 And since Rishi Kabra name is in multiple data breaches, then we will be able to get the search result, 29 00:02:24,670 --> 00:02:28,360 including his phone number and physical address. 30 00:02:28,360 --> 00:02:30,760 And we have already covered this before. 31 00:02:31,300 --> 00:02:36,070 Now, let's say that you don't want to purchase a subscription on Dehacked. 32 00:02:36,070 --> 00:02:44,470 In this case, you can download Facebook data leak that contains over 533 million phone numbers. 33 00:02:44,800 --> 00:02:51,520 And for me, this is very, very useful resource because it contains a lot of juicy information. 34 00:02:51,580 --> 00:02:58,180 So all you have to do is just to go to Facebook, find the person's Facebook account and then search 35 00:02:58,180 --> 00:02:59,560 within this data leak. 36 00:03:00,130 --> 00:03:07,240 And if you were not able to find the person's Facebook account, this does not mean that they didn't 37 00:03:07,240 --> 00:03:13,030 have a Facebook account before, because they might have deleted their Facebook account. 38 00:03:13,030 --> 00:03:15,340 And I have already seen this before. 39 00:03:15,370 --> 00:03:21,370 I was searching for someone on Facebook and I wasn't able to get or to find their Facebook account, 40 00:03:21,370 --> 00:03:28,720 but when I searched for their first and last name in Facebook data leak, I were able to find a Facebook 41 00:03:28,720 --> 00:03:31,420 account that is not available anymore. 42 00:03:31,960 --> 00:03:36,800 And this also allowed me to find some additional information and their phone number. 43 00:03:37,460 --> 00:03:41,990 Now let's say that a person has an old Snapchat account. 44 00:03:42,020 --> 00:03:48,650 Then you can search for their usernames in the Snapchat data breach and get the first digits. 45 00:03:48,950 --> 00:03:54,710 And then you can use the method that I've talked about in a previous section to find the full phone 46 00:03:54,710 --> 00:04:01,010 number, because as you can see here, the only two numbers that we cannot see are the last two digits. 47 00:04:01,010 --> 00:04:05,780 And we can get this from the Facebook password reset function. 48 00:04:07,220 --> 00:04:13,580 So in this lecture you have learned the methodology on how can you search for someone's phone number 49 00:04:13,580 --> 00:04:16,160 in leaked or breached databases. 50 00:04:16,730 --> 00:04:21,890 As I said before, finding someone's phone number is more difficult than finding their email addresses. 51 00:04:21,890 --> 00:04:27,500 But this does not mean that you shouldn't try all of the methods that I've talked about, because all 52 00:04:27,500 --> 00:04:31,340 what we are doing is Osint, so we are not doing anything sneaky. 53 00:04:31,370 --> 00:04:37,280 We are just gathering publicly available information that are shared on the internet. 54 00:04:37,610 --> 00:04:44,000 And if none of these methods worked for you, then you can search for someone's email address and start 55 00:04:44,000 --> 00:04:45,350 digging from there.