CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related links
- Hacking Tools
- Hack Apps
- Hacker Tools Free Download
- Hack Tools Download
- Hacking Tools For Windows 7
- Hacking Tools Name
- Hacking Tools For Kali Linux
- Hack Tools Download
- Nsa Hacker Tools
- Usb Pentest Tools
- New Hacker Tools
- Nsa Hack Tools Download
- Hacking Tools Hardware
- Hacking Tools Kit
- Hacker Tools For Ios
- Pentest Tools Android
- Hacker Tools Hardware
- Pentest Tools Framework
- Hacking Tools Usb
- Hacker Tools Github
- Hacking Tools For Beginners
- Hacking Tools Windows 10
- Top Pentest Tools
- Hacker Tools Free
- Hacker Tools Windows
- Hacker Tools Windows
- Pentest Tools Open Source
- Hackers Toolbox
- Hacking Tools Free Download
- Kik Hack Tools
- Hack Tools Pc
- Hacker Tools Mac
- Hacker Tools For Pc
- Pentest Tools Open Source
- Hacking Tools
- Hak5 Tools
- Hacking Tools For Games
- Nsa Hack Tools
- New Hack Tools
- Hacking Tools For Kali Linux
- Termux Hacking Tools 2019
- Hack Tools Download
- Hacker Search Tools
- Underground Hacker Sites
- Hacking Tools
- Pentest Tools Github
- Pentest Tools For Windows
- Ethical Hacker Tools
- Hacking Tools And Software
- Hacker Tools List
- Hacking Tools Online
- Best Pentesting Tools 2018
- Hacker Tools Free
- Hack Tools For Mac
- Hacking Tools Usb
- Hack Tools Online
- Pentest Tools Download
- Hacking Tools Pc
- Hacking Tools Hardware
- Hacking Tools For Games
- Hacker Tools Apk Download
- Pentest Tools Open Source
- Hack Website Online Tool
- Tools For Hacker
- Hacker Tools Free
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Windows
- Blackhat Hacker Tools
- Hacking Tools For Kali Linux
- Hack Apps
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Mac
- Hacker Tools Linux
- Hacker Tools
- Hack App
- Pentest Tools Url Fuzzer
- Pentest Tools Tcp Port Scanner
- Pentest Tools For Windows
- Hack Tools Mac
- Kik Hack Tools
- Nsa Hack Tools Download
- Hacking Tools Kit
- Hack Tools Pc
- Pentest Tools For Android
- Hacking Tools Kit
No comments:
Post a Comment