Saturday, August 29, 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related links
  1. Hacking Tools
  2. Hack Apps
  3. Hacker Tools Free Download
  4. Hack Tools Download
  5. Hacking Tools For Windows 7
  6. Hacking Tools Name
  7. Hacking Tools For Kali Linux
  8. Hack Tools Download
  9. Nsa Hacker Tools
  10. Usb Pentest Tools
  11. New Hacker Tools
  12. Nsa Hack Tools Download
  13. Hacking Tools Hardware
  14. Hacking Tools Kit
  15. Hacker Tools For Ios
  16. Pentest Tools Android
  17. Hacker Tools Hardware
  18. Pentest Tools Framework
  19. Hacking Tools Usb
  20. Hacker Tools Github
  21. Hacking Tools For Beginners
  22. Hacking Tools Windows 10
  23. Top Pentest Tools
  24. Hacker Tools Free
  25. Hacker Tools Windows
  26. Hacker Tools Windows
  27. Pentest Tools Open Source
  28. Hackers Toolbox
  29. Hacking Tools Free Download
  30. Kik Hack Tools
  31. Hack Tools Pc
  32. Hacker Tools Mac
  33. Hacker Tools For Pc
  34. Pentest Tools Open Source
  35. Hacking Tools
  36. Hak5 Tools
  37. Hacking Tools For Games
  38. Nsa Hack Tools
  39. New Hack Tools
  40. Hacking Tools For Kali Linux
  41. Termux Hacking Tools 2019
  42. Hack Tools Download
  43. Hacker Search Tools
  44. Underground Hacker Sites
  45. Hacking Tools
  46. Pentest Tools Github
  47. Pentest Tools For Windows
  48. Ethical Hacker Tools
  49. Hacking Tools And Software
  50. Hacker Tools List
  51. Hacking Tools Online
  52. Best Pentesting Tools 2018
  53. Hacker Tools Free
  54. Hack Tools For Mac
  55. Hacking Tools Usb
  56. Hack Tools Online
  57. Pentest Tools Download
  58. Hacking Tools Pc
  59. Hacking Tools Hardware
  60. Hacking Tools For Games
  61. Hacker Tools Apk Download
  62. Pentest Tools Open Source
  63. Hack Website Online Tool
  64. Tools For Hacker
  65. Hacker Tools Free
  66. How To Install Pentest Tools In Ubuntu
  67. Hack Tools For Windows
  68. Blackhat Hacker Tools
  69. Hacking Tools For Kali Linux
  70. Hack Apps
  71. Hacker Techniques Tools And Incident Handling
  72. Hack Tools For Mac
  73. Hacker Tools Linux
  74. Hacker Tools
  75. Hack App
  76. Pentest Tools Url Fuzzer
  77. Pentest Tools Tcp Port Scanner
  78. Pentest Tools For Windows
  79. Hack Tools Mac
  80. Kik Hack Tools
  81. Nsa Hack Tools Download
  82. Hacking Tools Kit
  83. Hack Tools Pc
  84. Pentest Tools For Android
  85. Hacking Tools Kit

No comments:

Post a Comment