Friday, August 28, 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related links


  1. Kik Hack Tools
  2. Hacker Tools Apk Download
  3. Hacker Tools For Pc
  4. How To Make Hacking Tools
  5. Hacking Tools For Mac
  6. Hacking Tools For Beginners
  7. How To Hack
  8. Pentest Box Tools Download
  9. Hak5 Tools
  10. Hacking Tools Hardware
  11. Pentest Tools For Windows
  12. Hack Tools For Pc
  13. Best Pentesting Tools 2018
  14. Underground Hacker Sites
  15. Pentest Tools Website
  16. Install Pentest Tools Ubuntu
  17. Hack Tools Online
  18. Tools Used For Hacking
  19. Hacker Tools For Ios
  20. Hack Tools Github
  21. Hacker Tools Linux
  22. Hacker Tools Windows
  23. Hacking Tools Kit
  24. Nsa Hacker Tools
  25. Hacking App
  26. Hacker Tools List
  27. Pentest Box Tools Download
  28. Kik Hack Tools
  29. Hacking Tools Mac
  30. What Is Hacking Tools
  31. Hack Tools Online
  32. Hack Apps
  33. Nsa Hacker Tools
  34. Pentest Tools Subdomain
  35. Best Hacking Tools 2019
  36. Growth Hacker Tools
  37. Tools For Hacker
  38. Easy Hack Tools
  39. Pentest Tools Nmap
  40. Hack Tool Apk No Root
  41. Pentest Tools Bluekeep
  42. Hack Website Online Tool
  43. Pentest Tools For Mac
  44. Hacker Tools Apk Download
  45. Hack Tools 2019
  46. Pentest Tools Alternative
  47. Hacking Tools For Windows
  48. New Hack Tools
  49. Hacker Tools
  50. Pentest Tools Alternative
  51. Best Hacking Tools 2019
  52. Hacker Tools Free
  53. Pentest Tools For Windows
  54. Hack Rom Tools
  55. Hack Tools Download
  56. Hacker Tools Linux
  57. Hack Tools
  58. Pentest Automation Tools
  59. Hacker Search Tools
  60. Pentest Tools Website Vulnerability
  61. Hacking Tools Software
  62. Hacking Tools Online
  63. Hack Tools
  64. Pentest Tools For Android
  65. Hacking Tools Kit
  66. Growth Hacker Tools
  67. Underground Hacker Sites
  68. Github Hacking Tools
  69. Hacking Tools For Windows Free Download
  70. Hackers Toolbox
  71. Hacking Tools Online
  72. How To Install Pentest Tools In Ubuntu
  73. Top Pentest Tools
  74. Hacker Tools Windows
  75. Free Pentest Tools For Windows
  76. Black Hat Hacker Tools
  77. Pentest Tools Android
  78. Nsa Hacker Tools
  79. Hacker Tools 2020
  80. Hacking Tools Software
  81. Best Hacking Tools 2020
  82. Pentest Tools Website

No comments:

Post a Comment