CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
More info
- Hack Tools For Windows
- Hacking Tools Github
- Hacking Tools Online
- Hacker Tools Free Download
- Hacking Tools Mac
- Hacker Tools Linux
- Hack Tools Mac
- Pentest Tools For Ubuntu
- Pentest Tools Free
- Hacker Tools Online
- Hack Tools 2019
- Hack Apps
- Hacker Tools 2019
- Hacking App
- Hack Tools Github
- Termux Hacking Tools 2019
- What Are Hacking Tools
- Hacker Tools Windows
- Hack Tools For Pc
- Hacker Tools Software
- Pentest Tools For Mac
- Hacking Tools For Windows Free Download
- Pentest Tools Apk
- Hacking Apps
- Hack And Tools
- Hack Tool Apk No Root
- Wifi Hacker Tools For Windows
- Tools Used For Hacking
- Hacking Tools For Games
- Pentest Tools Free
- Blackhat Hacker Tools
- Hacking Tools For Beginners
- Hack Tools Pc
- Hacking Tools For Windows
- Hack App
- Hacker Search Tools
- What Is Hacking Tools
- Hacker Tools List
- Hacking Tools
- Pentest Tools Find Subdomains
- Pentest Tools Linux
- Hack Apps
- Hacking Tools Free Download
- Hacker Tools Github
- Pentest Tools Android
- Pentest Tools Nmap
- Hacker Tools Free
- Termux Hacking Tools 2019
- Hack Apps
- Pentest Tools For Android
- What Is Hacking Tools
- Android Hack Tools Github
- Usb Pentest Tools
- Blackhat Hacker Tools
- Nsa Hack Tools
- Hack Tools Online
- Hackrf Tools
- Hacking Tools For Kali Linux
- Pentest Automation Tools
- Hacker Tools Mac
- Hacker Tools Apk Download
- Pentest Tools Apk
- Hacker Techniques Tools And Incident Handling
- Tools 4 Hack
- Hacking Tools Pc
- Install Pentest Tools Ubuntu
- Hack Tools For Windows
- Pentest Tools Download
- Hacking Tools Online
- Hacking Tools For Mac
- Pentest Tools Website
- Best Hacking Tools 2020
- Pentest Tools Subdomain
- Hacker Tools Windows
- Hack Apps
- Hack Tools
No comments:
Post a Comment