CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related articles
- Kik Hack Tools
- Hacker Search Tools
- Hacking Tools Usb
- How To Make Hacking Tools
- Usb Pentest Tools
- Hackrf Tools
- Hacking Tools Download
- Pentest Automation Tools
- Bluetooth Hacking Tools Kali
- Hacker Tools Linux
- Hacker Tools Apk
- Pentest Automation Tools
- Pentest Tools Framework
- Pentest Tools Github
- Hack Tools 2019
- Pentest Tools Open Source
- World No 1 Hacker Software
- Hack Tools For Pc
- Pentest Tools Review
- Hack Tools Pc
- Hack Tools
- Hacker Hardware Tools
- Hacking Tools Download
- Bluetooth Hacking Tools Kali
- How To Hack
- How To Install Pentest Tools In Ubuntu
- Hacking Tools 2019
- Hacker Tools For Pc
- Hacking Tools For Beginners
- Hacker Tools
- Hacking Tools For Mac
- Android Hack Tools Github
- Hack Tools For Games
- Kik Hack Tools
- Install Pentest Tools Ubuntu
- Top Pentest Tools
- Pentest Tools Android
- Wifi Hacker Tools For Windows
- Pentest Tools Open Source
- Pentest Tools For Windows
- Hackers Toolbox
- Usb Pentest Tools
- Android Hack Tools Github
- Hackers Toolbox
- Bluetooth Hacking Tools Kali
- Hack Website Online Tool
- Hack Tool Apk No Root
- Hack Apps
- Hacking Tools For Mac
- Android Hack Tools Github
- Hacking Tools Kit
- Physical Pentest Tools
- Hacking Tools Pc
- Tools Used For Hacking
- Pentest Tools For Android
- Hacking Tools 2020
- Pentest Tools Nmap
- Hack Apps
- Hacking Tools For Windows
- Pentest Automation Tools
- Pentest Tools Url Fuzzer
- Hack Tool Apk
- Bluetooth Hacking Tools Kali
- Pentest Tools Android
- Hack Tools Github
- Pentest Tools Alternative
- Hacking Tools For Kali Linux
- Easy Hack Tools
- Hacking Tools Name
- Pentest Tools List
- Hacker Tools For Windows
- Hack Tools Download
- Top Pentest Tools
- Beginner Hacker Tools
- Hacking Tools For Windows
- Hacker Tools Free Download
- New Hack Tools
- Hacking Apps
- What Is Hacking Tools
- Black Hat Hacker Tools
- Hack Apps
- Pentest Tools Download
- Hack Tools For Ubuntu
- Hacking Tools For Mac
- Pentest Tools Free
- Pentest Automation Tools
- Hack Tools For Pc
- Pentest Tools Windows
- Hacking Tools Name
- Hacker Tools
- Hacking Tools For Mac
- Hack Tools
- Usb Pentest Tools
- Hackers Toolbox
- Hacking Tools Mac
- Hacker Tools For Ios
- Hak5 Tools
- Pentest Tools For Ubuntu
- Pentest Tools Website Vulnerability
- Hacking Tools Windows
- Pentest Tools Review
- Usb Pentest Tools
- Hacker Tools Github
- Free Pentest Tools For Windows
- Hacker Tools Hardware
- Pentest Tools For Ubuntu
- Hacking Tools Windows
- Hacking Tools Pc
- Termux Hacking Tools 2019
- Hack App
- Hacking Tools For Beginners
- Hack Tools For Windows
- Blackhat Hacker Tools
- Pentest Tools List
- Hacking Tools
- Hackers Toolbox
- Hacking Tools For Beginners
- Hacker Tools Mac
- Hak5 Tools
- Bluetooth Hacking Tools Kali
- Tools 4 Hack
- Hacker Tools 2020
- Hacker Tools Linux
- Hacker Tools Apk
- Hacker Tools Online
- Wifi Hacker Tools For Windows
0 comments:
Post a Comment