PHASE: The Grey Area33% COMPLETION
Abort Mission
MODULE 09

Breach Data Analysis

Ethical use of leaked databases for intelligence gathering.

The Grey Area

Breach data is stolen property. However, it is also public intelligence.

Defensive Use

Checking if your organization's credentials are exposed (HIBP).

Offensive Use

Using old passwords to guess new ones (Credential Stuffing). This is illegal in most jurisdictions.