Friday 28 August 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related posts


  1. Pentest Tools For Ubuntu
  2. Pentest Reporting Tools
  3. Hack Apps
  4. Kik Hack Tools
  5. Tools Used For Hacking
  6. Hackrf Tools
  7. Pentest Tools Subdomain
  8. Bluetooth Hacking Tools Kali
  9. Hackers Toolbox
  10. Hacking Tools Name
  11. Hack Tools Download
  12. Game Hacking
  13. World No 1 Hacker Software
  14. Ethical Hacker Tools
  15. Hacker Tools Free
  16. Hack Tools Mac
  17. New Hacker Tools
  18. New Hack Tools
  19. Hacking Tools Windows
  20. Pentest Reporting Tools
  21. Hack Tools Pc
  22. Pentest Tools Windows
  23. Pentest Tools Framework
  24. Hacking Tools For Kali Linux
  25. Pentest Tools Open Source
  26. Game Hacking
  27. Hack Rom Tools
  28. Hacking Tools 2020
  29. Hack And Tools
  30. Pentest Tools For Windows
  31. Pentest Tools Framework
  32. Hacking Tools Free Download
  33. Hack And Tools
  34. Hacking Tools Download
  35. Hacking Tools For Pc
  36. Hacking Tools For Kali Linux
  37. Hacker Tools For Ios
  38. Hacking Tools
  39. Pentest Tools Windows
  40. Pentest Tools For Windows
  41. How To Hack
  42. Pentest Tools Online
  43. Hack And Tools
  44. Hack Tools For Ubuntu
  45. Free Pentest Tools For Windows
  46. Hacker Tools For Windows
  47. Hack Tools For Mac
  48. Pentest Tools For Android
  49. Best Pentesting Tools 2018
  50. Pentest Tools Android
  51. Hacking Tools Software
  52. Nsa Hack Tools Download
  53. Hacker Tools Online
  54. Pentest Tools Framework
  55. Nsa Hacker Tools
  56. Hacker Tools 2020
  57. Github Hacking Tools
  58. Pentest Tools List
  59. Top Pentest Tools
  60. Black Hat Hacker Tools
  61. Hackrf Tools
  62. Tools Used For Hacking
  63. Pentest Tools Android
  64. Hacking Tools 2019
  65. Best Pentesting Tools 2018
  66. Hack Website Online Tool
  67. Pentest Tools For Windows
  68. Hack Tools For Ubuntu
  69. What Are Hacking Tools
  70. Hacking Apps
  71. Pentest Tools Apk
  72. Hacking Tools Download
  73. Hack Rom Tools
  74. Tools 4 Hack
  75. Hacker Tools For Windows
  76. Pentest Tools Find Subdomains
  77. Hacker Hardware Tools
  78. Game Hacking
  79. Hacking Tools Github
  80. Growth Hacker Tools
  81. Computer Hacker
  82. Hacker Security Tools
  83. Pentest Tools Free
  84. Hacker Tools Free Download
  85. Hackrf Tools
  86. Pentest Tools Free
  87. Pentest Tools Nmap
  88. Hacking Tools Software
  89. Hacker Tools Windows
  90. Tools For Hacker
  91. Pentest Tools
  92. Tools Used For Hacking
  93. Hacking Tools Windows
  94. Hacking Tools Name
  95. Hack Tools 2019
  96. Best Hacking Tools 2020
  97. Pentest Tools List
  98. Hack Tools 2019
  99. Hacker Tools For Windows
  100. Hacking Tools For Windows 7
  101. How To Make Hacking Tools
  102. Pentest Tools For Windows
  103. World No 1 Hacker Software
  104. Hacker Tools Free Download
  105. Growth Hacker Tools
  106. Hacker Tools Free
  107. Hack Apps
  108. How To Make Hacking Tools
  109. How To Make Hacking Tools
  110. Hacker Tools Apk Download
  111. Pentest Tools For Android
  112. Hack App
  113. Hack Tools
  114. Hacking Tools Kit
  115. Hacker Security Tools
  116. Pentest Automation Tools
  117. Hacking Tools 2019
  118. Hacker Tools Linux
  119. Hacking Tools Windows
  120. Free Pentest Tools For Windows
  121. Hack Tools For Games
  122. Hacking Tools And Software
  123. Hack Tools For Games
  124. Hacker Search Tools
  125. Pentest Tools Download
  126. Underground Hacker Sites
  127. Hacking Tools For Kali Linux

0 comments:

Post a Comment