. . . "Attackers can use it to crawl the website, Twitter accounts, or other online resources associated with the site or company that leaked the password hashes." . .