Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
hi, everyone. And welcome back in the last video, we talked about finding emails and user names for euros and investigations, and now we're going to go over leaks and various data breaches and tell you where to find them.
00:14
I have to put a little disclaimer here because this same for is only for educational purposes. The main reason is because all this publicly available content concerning leaks and data breaches was acquired by criminals. I cannot give you legal advice on this, since I'm not an attorney.
00:31
But I can make a suggestion to be careful and to ask for advice.
00:35
If you come across something potentially carful for you and people around you
00:40
in this lesson, you will learn where to finally and breach data information.
00:45
I have made a list of a few sites that offer this kind of information. First, this have a bean pond dot com, which is probably the golden standard nowadays to check if your email or user name has been a part of any known data bridge. Next is leak peak dot com,
01:00
which is the new K site. Or at least that's what they say they are,
01:06
and I like this one because you can also search for anemia. Laura. User name. And it will show you the 1st 3 characters off a password and from which database breach is coming from. Next is we leaking info dot com, which is a very popular service that grants you to see past for details if you pay.
01:25
Currently, this side is not active because the domain has been seized by the FBI. I put this on the list just for you to understand that seriousness off this kind of sites and data you're after
01:37
next ghost project dot f R,
01:40
which is, according to the owners, a 41 gigabyte dump that was found in the late 2017 in an underground community forum. You could search for emails or use their names, and they will come with the clear text passwords if available. Also, there is a paid version to see the whole data.
02:00
Almost all of the sites offer obeyed feature to unlock, maybe passwords, user names, emails, give out advanced search filters and so want. Personally speaking, I would not recommend paying for access to any of these data because of the privacy security issues that could arrive at your table.
02:17
Be aware of the legal repercussions because learning help to search for these data is totally different from using that found data to access someone's account or do any other malicious activity.
02:30
And lastly, I would suggest a different approach. Actually, we already talked about the demands. The Google searches single Dorking, but did not mention Paste bin that Come, which is a website that allows the users to share plain text public posts called bastes. The concept is not new base being just grew.
02:51
Actually, a lot of beaches are published here, so give it a try
02:54
and this lesson went over leaks and data breach sources. And in the next video, we'll go over and oh sent approach towards I day systems.

Up Next

Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By

Instructor Profile Image
Tino Sokic
CEO at DobarDan
Instructor