Wednesday, August 26, 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related links


  1. Bluetooth Hacking Tools Kali
  2. Hacking Tools Hardware
  3. Nsa Hacker Tools
  4. Nsa Hack Tools
  5. Hacker Tools Apk Download
  6. Hacker Techniques Tools And Incident Handling
  7. Hacker Tools Online
  8. How To Hack
  9. Hacker Tools For Pc
  10. Hacking Tools Pc
  11. Hacking Tools Free Download
  12. Hacker Search Tools
  13. Blackhat Hacker Tools
  14. Blackhat Hacker Tools
  15. Hacking Tools For Windows 7
  16. Hacking Tools Name
  17. Pentest Tools For Windows
  18. Pentest Tools Website
  19. Hackers Toolbox
  20. Bluetooth Hacking Tools Kali
  21. Hack Tool Apk
  22. Hacker Tools Github
  23. Hacking Tools Kit
  24. How To Install Pentest Tools In Ubuntu
  25. Best Hacking Tools 2019
  26. Hacker
  27. Hak5 Tools
  28. Hacking App
  29. Hacking Tools Mac
  30. Pentest Tools List
  31. Hack Tools For Mac
  32. Pentest Tools Website
  33. Pentest Tools Kali Linux
  34. Hack Tools
  35. Pentest Tools Bluekeep
  36. Hack Tools Download
  37. Hack Tools 2019
  38. Hacker Tools Apk
  39. Hacker Security Tools
  40. Hacker Tools For Windows
  41. Hacker Techniques Tools And Incident Handling
  42. Pentest Tools Url Fuzzer
  43. Hacker Tools Software
  44. Hack Tools For Pc
  45. Hack Tool Apk
  46. Hack Rom Tools
  47. Tools Used For Hacking
  48. Hacker Tools For Mac
  49. Pentest Tools For Ubuntu
  50. Pentest Tools Android
  51. Hacker Tools For Pc
  52. Pentest Tools Open Source
  53. Pentest Tools Android
  54. World No 1 Hacker Software
  55. Hacking Tools For Pc
  56. Free Pentest Tools For Windows
  57. Game Hacking
  58. Pentest Tools Apk
  59. Hacker Techniques Tools And Incident Handling
  60. World No 1 Hacker Software
  61. Github Hacking Tools

No comments:

Post a Comment