The book consists of a foreword, preface, 14 chapters, and two appendixes.
Click on the chapter to the right and you will be able to read a small excerpt where available. Chapters available for reading are emboldened.
Excerpts of available chapters are only available as early uncorrected drafts.
At present, the raw and unedited excerpts of available chapters are as follows:
- Chapter 5.5: The Story of RaidForums - Chapter 9.1.2: How Images Work Against You
Foreword by Zach Naimon (Principal Product Engineer @ ClickHouse) Preface (Why Black Hat OSINT? Who is This Book For?) Part I: Understanding Open-Source Intelligence 1 What is OSINT and What Can You Do With it? 1.1 What is OSINT? 1.2 Dissecting Intelligence 1.3 OSINT Use Cases 1.4 Summary 2 OSINT Operations and Hacking 2.1 Hacking: A Modern Day OSINT Machine 2.2 The Basics of Stolen Data and OSINT Operations 2.3 Beyond the Basics: Harassment & Doxing 2.4 Summary Part II: Your Data as an Intelligence Source 3 How is Data Stolen? 3.1 Attack Vectors 3.1.1 Injection 3.1.2 Broken Access Control and Cryptographic Failures 3.1.3 Insecure Design 3.1.4 Security Misconfiguration 3.1.5 Vulnerable and Outdated Components 3.1.6 Identification and Authentication Failures 3.1.7 Cross-Site Scripting (XSS) 3.1.8 Cross-Site Request Forgery (CSRF) 3.1.9 Social Engineering and Other Attack Vectors 3.2 Data Breach Search Engines and Your Data 3.3 Summary 4 What Happens When Data is Stolen? 4.1 How Did We Come to This? 4.2 Stolen Data and the Data Breach Ecosystem 4.3 How Do Hackers Acquire So Many Data Breaches? 4.4 Stolen Data, OSINT, and Data Breach Search Engines 4.5 Summary 5 Real-life War Stories Involving Data Breaches And OSINT 5.1 Data Breaches and Your Data 5.1.1 SkidBase 5.2 Data Breaches, Your Data, and Script Kiddies 5.3 LeakedSource, WeLeakInfo & co. 5.4 What to Do When Your Data Becomes Interested in You? 5.5 The Story of RaidForums 5.5.1 What was RaidForums? 5.5.2 The Inception of RaidForums? 5.5.3 The Role of Twitch, Raiding, and the Birth of RaidForums 5.5.4 The Entry Towards the Dark 5.5.5 RaidForums and Leaked Databases 5.5.6 RaidForums and Law Enforcement 5.6 Summary 6 Internals of Data Breach Search Engines 6.1 What Do Data Breach Search Engines Consist Of? 6.1.1 Acquiring Data 6.1.2 Formatting and Parsing Data 6.1.3 Using Data 6.1.4 (Not) Sharing and Trading Data 6.2 Buidling a Data Breach Search Engine 6.3 Data Breach Search Engines and Privacy Regulations 6.4 Summary 7 The Legality of Data Breach Search Engines 7.1 What Makes a Data Breach Search Engine Illegal? 7.2 The Case of LeakedSource 7.2.1 LeakedSource and LinkedIn 7.3 Law Enforcement and Data Breach Search Engines 7.4 Summary 8 Data Breach Search Engines and OSINT Use Cases 8.1 Personal Use Cases 8.2 Academic Assignments 8.3 Web & Network Forensics 8.4 Bomb Threats & Terrorism 8.5 Doxing & Beyond 8.6 Summary Part III: Leveraging Open-Source Intelligence for Privacy 9 Utilizing OSINT for Tracing and Privacy 9.1 How Your Data Works Against You 9.1.1 How Your Email Address Works Against You 9.1.2 How Images Work Against You 9.1.3 How Videos Work Against You 9.1.4 How Phone Calls Work Against You 9.1.5 "I Can Find Any Location in the Entire World" 9.2 Web & Network Forensics Revisited 9.3 Utilizing OSINT to Enhance Privacy 9.4 How to Determine If You Are at Risk 9.5 Summary 10 Operational Security and OSINT 10.1 What is Operational Security and How Is It Related to OSINT? 10.2 Practicing Operational Security 10.3 Browsing Securely 10.4 Communicating Securely 10.5 OSINT for Operational Security & Notes 10.6 Summary 11 The Essentials of Secure Communications 11.1 What Makes Communications Secure? 11.2 Not All Messengers are Secure 11.3 Encrypted Messengers Explained 11.4 Privacy, Anonymity, and Security 11.5 Summary 12 De-Indexing Your Data 12.1 What Does De-Indexing Mean? 12.2 The Right to Be Forgotten and GDPR 12.3 Marked as Deleted 12.4 Erasing Your Footprint 12.5 Recovering and Tracking Footprints 12.6 What to Do When You're Doxed? 12.7 Summary 13 The Art of Disappearing 13.1 Hiding from Search Engines 13.1.1 Hiding From Google 13.1.2 Hiding From Bing! 13.1.3 Hiding From Data Breach Search Engines 13.2 Hiding From Resolvers 13.3 Hiding Your Social Links 13.4 The Web Archive Will Expose You 13.5 Privacy Comes with a Price to Pay 13.6 Emerging OSINT Sources and Their Privacy Implications 13.7 Automated Monitoring of Breach Data for Privacy Purposes 13.8 Summary 14 BreachDirectory and Plagiarism 14.1 Why a Separate Chapter on This? 14.2 BreachDirectory.com and BreachDirectory.org 14.3 Summary Appendix A: OSINT Exercises 15.1 Social Media Profiling 15.1.1 Social Media Profiling in the Real World 15.2 OSINT Using Images 15.2 OSINT Using Location Data 15.2 OSINT Using Data Breach Data Appendix B: Legal Considerations, Hacking Forums, and Co. 16.1 Data Breaches 16.2 Using Hacking Forums and Related Services 16.3 Staying Anonymous Online
Black Hat OSINT
Black Hat OSINT connects technical security failures with the real-world intelligence abuse that follows them. The book goes beyond vulnerability lists and breach reports to show how stolen data is actually operationalized and how attackers use stolen data for targeting, profiling, and exploitation using OSINT techniques.
Just as importantly, the book reframes OSINT as a defensive skill. It teaches security professionals how to think like adversaries, how to trace breached data across various sources, and assess the downstream impact of a breach on individuals and organizations.
This perspective strengthens threat modeling, incident response, and risk communication, while also reinforcing operational security and privacy awareness. For cybersecurity practitioners who want to understand not just how systems fail, but how those failures are exploited in the wild, Black Hat OSINT fills a critical gap.
You will learn: