01-05-2021, 10:38 AM
A few years ago i have registered with a service called apsense, this service allow the user to connect with other people to increase your network power and one day the owner of [email protected] contacted me. Since i was new to the hacking scene i tested the email against HaveiBeenPwned and found that it was leaked. I download the most obvious database as i knew back then that ClixSense database had the passwords in plain text and got the password.
Here is a step by step...
1 - Checked if the email was leaked at HaveiBeenPwned.
![[Image: videogif1.gif]](https://i.ibb.co/hdFY5j9/videogif1.gif)
2 - Get info and downloading the database
![[Image: videogif2.gif]](https://i.ibb.co/6m2R2nG/videogif2.gif)
3 - Decompressing the SQL file
![[Image: videogif3.gif]](https://i.ibb.co/sQRBVDW/videogif3.gif)
4 - Opening the SQL file with EmEditor
![[Image: videogif4.gif]](https://i.ibb.co/pdZBtJ0/videogif4.gif)
4.1 - Getting the info from the file
![[Image: videogif4-1.gif]](https://i.ibb.co/tJ2x6bc/videogif4-1.gif)
5 - Credentials from the raw data
Here is a step by step...
1 - Checked if the email was leaked at HaveiBeenPwned.
![[Image: videogif1.gif]](https://i.ibb.co/hdFY5j9/videogif1.gif)
2 - Get info and downloading the database
![[Image: videogif2.gif]](https://i.ibb.co/6m2R2nG/videogif2.gif)
3 - Decompressing the SQL file
![[Image: videogif3.gif]](https://i.ibb.co/sQRBVDW/videogif3.gif)
4 - Opening the SQL file with EmEditor
![[Image: videogif4.gif]](https://i.ibb.co/pdZBtJ0/videogif4.gif)
4.1 - Getting the info from the file
![[Image: videogif4-1.gif]](https://i.ibb.co/tJ2x6bc/videogif4-1.gif)
5 - Credentials from the raw data
![[Image: videogif5.gif]](https://i.ibb.co/zsQTjxJ/videogif5.gif)