CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related posts
- Pentest Tools For Ubuntu
- Pentest Reporting Tools
- Hack Apps
- Kik Hack Tools
- Tools Used For Hacking
- Hackrf Tools
- Pentest Tools Subdomain
- Bluetooth Hacking Tools Kali
- Hackers Toolbox
- Hacking Tools Name
- Hack Tools Download
- Game Hacking
- World No 1 Hacker Software
- Ethical Hacker Tools
- Hacker Tools Free
- Hack Tools Mac
- New Hacker Tools
- New Hack Tools
- Hacking Tools Windows
- Pentest Reporting Tools
- Hack Tools Pc
- Pentest Tools Windows
- Pentest Tools Framework
- Hacking Tools For Kali Linux
- Pentest Tools Open Source
- Game Hacking
- Hack Rom Tools
- Hacking Tools 2020
- Hack And Tools
- Pentest Tools For Windows
- Pentest Tools Framework
- Hacking Tools Free Download
- Hack And Tools
- Hacking Tools Download
- Hacking Tools For Pc
- Hacking Tools For Kali Linux
- Hacker Tools For Ios
- Hacking Tools
- Pentest Tools Windows
- Pentest Tools For Windows
- How To Hack
- Pentest Tools Online
- Hack And Tools
- Hack Tools For Ubuntu
- Free Pentest Tools For Windows
- Hacker Tools For Windows
- Hack Tools For Mac
- Pentest Tools For Android
- Best Pentesting Tools 2018
- Pentest Tools Android
- Hacking Tools Software
- Nsa Hack Tools Download
- Hacker Tools Online
- Pentest Tools Framework
- Nsa Hacker Tools
- Hacker Tools 2020
- Github Hacking Tools
- Pentest Tools List
- Top Pentest Tools
- Black Hat Hacker Tools
- Hackrf Tools
- Tools Used For Hacking
- Pentest Tools Android
- Hacking Tools 2019
- Best Pentesting Tools 2018
- Hack Website Online Tool
- Pentest Tools For Windows
- Hack Tools For Ubuntu
- What Are Hacking Tools
- Hacking Apps
- Pentest Tools Apk
- Hacking Tools Download
- Hack Rom Tools
- Tools 4 Hack
- Hacker Tools For Windows
- Pentest Tools Find Subdomains
- Hacker Hardware Tools
- Game Hacking
- Hacking Tools Github
- Growth Hacker Tools
- Computer Hacker
- Hacker Security Tools
- Pentest Tools Free
- Hacker Tools Free Download
- Hackrf Tools
- Pentest Tools Free
- Pentest Tools Nmap
- Hacking Tools Software
- Hacker Tools Windows
- Tools For Hacker
- Pentest Tools
- Tools Used For Hacking
- Hacking Tools Windows
- Hacking Tools Name
- Hack Tools 2019
- Best Hacking Tools 2020
- Pentest Tools List
- Hack Tools 2019
- Hacker Tools For Windows
- Hacking Tools For Windows 7
- How To Make Hacking Tools
- Pentest Tools For Windows
- World No 1 Hacker Software
- Hacker Tools Free Download
- Growth Hacker Tools
- Hacker Tools Free
- Hack Apps
- How To Make Hacking Tools
- How To Make Hacking Tools
- Hacker Tools Apk Download
- Pentest Tools For Android
- Hack App
- Hack Tools
- Hacking Tools Kit
- Hacker Security Tools
- Pentest Automation Tools
- Hacking Tools 2019
- Hacker Tools Linux
- Hacking Tools Windows
- Free Pentest Tools For Windows
- Hack Tools For Games
- Hacking Tools And Software
- Hack Tools For Games
- Hacker Search Tools
- Pentest Tools Download
- Underground Hacker Sites
- Hacking Tools For Kali Linux
0 comments:
Post a Comment