Passwords Steps Search through various databases of breached credentials. Look for patterns in the passwords that might have been repeated or rearranged. You might be able to use the same password and/or a variation of the password elsewhere.