CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related news
- How To Hack
- New Hack Tools
- Pentest Tools Bluekeep
- Hacker Tools 2019
- Wifi Hacker Tools For Windows
- Hacking Tools For Windows Free Download
- Hack Tools Mac
- Hacker Tools Apk
- Hack Tools For Ubuntu
- Pentest Box Tools Download
- Hack Tools For Ubuntu
- Beginner Hacker Tools
- Hacker Tools For Mac
- Hacking Tools 2019
- Pentest Reporting Tools
- Hacking Tools Windows 10
- Hacker Tools
- Nsa Hack Tools Download
- Best Hacking Tools 2019
- Best Hacking Tools 2019
- Hacker Security Tools
- Hacking Tools Free Download
- Pentest Tools
- Hacking Tools Hardware
- Pentest Tools Open Source
- Hack Apps
- Hack Tools
- Hacker Tools
- Hacker Tools For Windows
- Hack Tools For Pc
- Hacking Tools Mac
- Hack Tools
- Top Pentest Tools
- Pentest Tools For Windows
- Usb Pentest Tools
- Black Hat Hacker Tools
- Hacker Tools Online
- Hack Apps
- Hack Tools For Windows
- Hacking Tools Name
- Underground Hacker Sites
- Pentest Tools Alternative
- Pentest Tools Kali Linux
- Hacker Tools Apk
- Easy Hack Tools
- Hacker
- Hack Tools Download
- Pentest Tools Bluekeep
- Hacking Tools
- Ethical Hacker Tools
- Pentest Tools For Android
- Hack Tools 2019
- Android Hack Tools Github
- Hacking Tools Windows
- Hacking Tools Github
- Hacker Tools Software
- Best Hacking Tools 2019
- Kik Hack Tools
- Bluetooth Hacking Tools Kali
- Best Hacking Tools 2019
- Wifi Hacker Tools For Windows
- Hack Tools Download
- Pentest Tools For Ubuntu
- Android Hack Tools Github
- Hacking Tools And Software
- Pentest Tools Review
- Pentest Tools Github
- Pentest Recon Tools
- Hacker Tools Online
- Easy Hack Tools
- Hack And Tools
- Hack Tools
- Hack Tools
- Wifi Hacker Tools For Windows
- Hacker Tools List
- Hacking Tools
- Pentest Tools Tcp Port Scanner
- Hacking Apps
- Hak5 Tools
- Pentest Tools Free
- Hacker Tools 2019
- New Hacker Tools
- Pentest Tools Port Scanner
- Hacking Tools For Pc
- Game Hacking
- Pentest Tools Tcp Port Scanner
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Windows
- Hack Apps
- Pentest Tools
- Ethical Hacker Tools
- Hack Tools Download
- Nsa Hack Tools Download
- Hacker Tools Apk
- Tools Used For Hacking
- Hacking Tools Windows 10
- Easy Hack Tools
- Pentest Recon Tools
- Hacking Tools Download
- Hacker Tools Apk Download
- Pentest Tools Online
- Pentest Tools Website
- Pentest Tools Website Vulnerability
- Hacker Search Tools
- Hacker Tools For Pc
- Termux Hacking Tools 2019
- Pentest Recon Tools
- Hack Apps
- Install Pentest Tools Ubuntu
- Nsa Hack Tools Download
- Black Hat Hacker Tools
No comments:
Post a Comment