CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related links
- Kik Hack Tools
- Hacker Tools Apk Download
- Hacker Tools For Pc
- How To Make Hacking Tools
- Hacking Tools For Mac
- Hacking Tools For Beginners
- How To Hack
- Pentest Box Tools Download
- Hak5 Tools
- Hacking Tools Hardware
- Pentest Tools For Windows
- Hack Tools For Pc
- Best Pentesting Tools 2018
- Underground Hacker Sites
- Pentest Tools Website
- Install Pentest Tools Ubuntu
- Hack Tools Online
- Tools Used For Hacking
- Hacker Tools For Ios
- Hack Tools Github
- Hacker Tools Linux
- Hacker Tools Windows
- Hacking Tools Kit
- Nsa Hacker Tools
- Hacking App
- Hacker Tools List
- Pentest Box Tools Download
- Kik Hack Tools
- Hacking Tools Mac
- What Is Hacking Tools
- Hack Tools Online
- Hack Apps
- Nsa Hacker Tools
- Pentest Tools Subdomain
- Best Hacking Tools 2019
- Growth Hacker Tools
- Tools For Hacker
- Easy Hack Tools
- Pentest Tools Nmap
- Hack Tool Apk No Root
- Pentest Tools Bluekeep
- Hack Website Online Tool
- Pentest Tools For Mac
- Hacker Tools Apk Download
- Hack Tools 2019
- Pentest Tools Alternative
- Hacking Tools For Windows
- New Hack Tools
- Hacker Tools
- Pentest Tools Alternative
- Best Hacking Tools 2019
- Hacker Tools Free
- Pentest Tools For Windows
- Hack Rom Tools
- Hack Tools Download
- Hacker Tools Linux
- Hack Tools
- Pentest Automation Tools
- Hacker Search Tools
- Pentest Tools Website Vulnerability
- Hacking Tools Software
- Hacking Tools Online
- Hack Tools
- Pentest Tools For Android
- Hacking Tools Kit
- Growth Hacker Tools
- Underground Hacker Sites
- Github Hacking Tools
- Hacking Tools For Windows Free Download
- Hackers Toolbox
- Hacking Tools Online
- How To Install Pentest Tools In Ubuntu
- Top Pentest Tools
- Hacker Tools Windows
- Free Pentest Tools For Windows
- Black Hat Hacker Tools
- Pentest Tools Android
- Nsa Hacker Tools
- Hacker Tools 2020
- Hacking Tools Software
- Best Hacking Tools 2020
- Pentest Tools Website
No comments:
Post a Comment