PHASE: The Grey Area33% COMPLETION
MODULE 09
Breach Data Analysis
Ethical use of leaked databases for intelligence gathering.
The Grey Area
Breach data is stolen property. However, it is also public intelligence.
Defensive Use
Checking if your organization's credentials are exposed (HIBP).
Offensive Use
Using old passwords to guess new ones (Credential Stuffing). This is illegal in most jurisdictions.