Breached Passwords: How to easily identify the Achilles heel