Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,070 --> 00:00:09,210
Rehashed de Hashes, a website that takes a bunch of compromise, emails, usernames, phone numbers,
2
00:00:09,750 --> 00:00:14,610
pretty much everything, everything that you'll find in a data breach and comprises into one site.
3
00:00:15,570 --> 00:00:21,150
Now the great thing about this is, again, it's not just email addresses or a name, it pulls pretty
4
00:00:21,150 --> 00:00:24,540
much anything from a data breach and indexes it for you.
5
00:00:25,140 --> 00:00:27,420
Now there is a free version and a paid one.
6
00:00:27,780 --> 00:00:32,700
Paid one is, I think, about $4 for seven days access unlimited searches.
7
00:00:33,450 --> 00:00:38,070
So if you're doing a small instant diversification, you just really want to verify something.
8
00:00:38,580 --> 00:00:40,680
The hash is a really good website for it.
9
00:00:41,610 --> 00:00:47,250
Now, if you can use it for free, just create a free account that will give you some information that
10
00:00:47,550 --> 00:00:48,420
things like yes.
11
00:00:48,840 --> 00:00:50,730
It was part of its data breach.
12
00:00:51,570 --> 00:00:54,420
Now for O.S., you might be wondering why this is important.
13
00:00:55,410 --> 00:00:58,050
Well, my original was class.
14
00:00:58,050 --> 00:01:00,930
I do go over that, but I, for people are new.
15
00:01:00,940 --> 00:01:03,120
I think it is important to go over this again.
16
00:01:03,780 --> 00:01:10,530
So if I have an email address and name phone number, it's really handy to throw into something like
17
00:01:10,530 --> 00:01:11,250
de hash.
18
00:01:11,880 --> 00:01:16,590
Because once I turn into hash, I could find out where else that username was used, where else that
19
00:01:16,590 --> 00:01:18,090
email address was used.
20
00:01:19,590 --> 00:01:23,400
I might know about a Facebook account, but I might not know that it had also.
21
00:01:23,610 --> 00:01:25,770
The email address is also part of a Twitter account.
22
00:01:26,190 --> 00:01:28,410
A C Ashley Madison account.
23
00:01:29,370 --> 00:01:37,470
If you know a forum account and what not, or if I have a password, I can throw the password in and
24
00:01:37,470 --> 00:01:42,000
potentially find out other accounts it was being used at, especially if it was a unique password.
25
00:01:42,780 --> 00:01:44,040
Now it's pretty easy to use.
26
00:01:44,670 --> 00:01:49,580
If you just go in here, you make sure you put in quotes so many quote and see.
27
00:01:49,590 --> 00:01:51,180
Our target is John Lee.
28
00:01:51,540 --> 00:01:53,280
It's, you know, pretty generic name.
29
00:01:53,790 --> 00:01:57,150
John Lee and I put it end quote and do search.
30
00:02:00,740 --> 00:02:01,070
OK.
31
00:02:01,640 --> 00:02:04,170
It's going to be in the free account, it's going to show up like this.
32
00:02:04,190 --> 00:02:11,960
You're going to see, you know, like John Desch Lee at Hotmail dot com, amazon.com, whatever, whatever
33
00:02:11,960 --> 00:02:14,840
email addresses said it was part part of a data breach.
34
00:02:15,860 --> 00:02:18,650
And it's going to tell you what that data breach is.
35
00:02:18,980 --> 00:02:26,810
Now if you have a paid version like I do right now, I can click on any of these and it'll tell me either
36
00:02:26,810 --> 00:02:30,980
what the password is on hash or hash, depending on what the.
37
00:02:32,230 --> 00:02:41,020
What the breaches and in here is a hash password, and again, so if I find a name, I find a hash password
38
00:02:41,020 --> 00:02:42,370
I find on hash password.
39
00:02:43,510 --> 00:02:45,280
What you want to do is you can take that.
40
00:02:46,180 --> 00:02:47,260
So say.
41
00:02:48,800 --> 00:02:50,750
We know the username we didn't know he had.
42
00:02:50,870 --> 00:02:56,600
We didn't know he had what the email address was, so let's copy that and we can go back and hear.
43
00:02:58,090 --> 00:03:00,520
And we could put repays that email address.
44
00:03:00,640 --> 00:03:03,460
We could see real sent email addresses being used in.
45
00:03:07,500 --> 00:03:13,500
OK, so it looks like that was part of the bye to rt.com dump and also data breach compilation dump.
46
00:03:14,410 --> 00:03:20,220
So other things that can come in handy might Wales might find again might be a part of the forum.
47
00:03:20,220 --> 00:03:26,340
We might find out, Oh, hey, it's part of a State Farm data breach.
48
00:03:26,340 --> 00:03:30,240
OK, so they have a State Farm or they they belong to this forum.
49
00:03:30,900 --> 00:03:33,600
And then from that forum you might be able find more information.
50
00:03:34,110 --> 00:03:41,580
So again, this is de hashed and you can put in usernames, phone numbers, addresses, names, email
51
00:03:41,580 --> 00:03:43,260
addresses, pretty much whatever.
52
00:03:43,470 --> 00:03:48,480
And it's going to if it was part of a data breach, it's probably going to be on the site and it be
53
00:03:48,480 --> 00:03:50,340
found at D-Hawaii QCOM.
54
00:03:50,670 --> 00:03:51,450
Thank you for watching.
5327
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.