CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence
CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Continue reading
- Usb Pentest Tools
- Hacking Tools Windows
- Free Pentest Tools For Windows
- Hack App
- How To Install Pentest Tools In Ubuntu
- Pentest Automation Tools
- Hacking Tools Free Download
- World No 1 Hacker Software
- Hacker Techniques Tools And Incident Handling
- Tools 4 Hack
- Hacker Search Tools
- Install Pentest Tools Ubuntu
- Pentest Tools Nmap
- Pentest Recon Tools
- Hacks And Tools
- Hacking Tools Github
- Black Hat Hacker Tools
- Hack Tools Online
- Hacking Tools For Windows 7
- Hacking Tools For Mac
- Hacking Tools Kit
- Hacking Tools Mac
- Beginner Hacker Tools
- Hacker Tools
- Hacking Tools Free Download
- Hacker Tools
- Hacking Tools Online
- Nsa Hacker Tools
- Hacking Tools For Kali Linux
- Hacking Tools Hardware
- Nsa Hack Tools Download
- Hacking Tools
- Growth Hacker Tools
- Pentest Tools Url Fuzzer
- Hacking Tools Name
- Nsa Hack Tools
- Hackrf Tools
- Hacking Tools Windows 10
- Pentest Tools For Mac
- Hacker Hardware Tools
- Hacking Tools Windows 10
- Hacking Tools For Pc
- Nsa Hacker Tools
- Hacking Tools For Windows 7
- Hacking Tools Free Download
- How To Install Pentest Tools In Ubuntu
- Tools 4 Hack
- Pentest Automation Tools
- Pentest Tools Github
- Tools 4 Hack
- Hacker Tools Online
- Hack Tools 2019
- Hacker Tools Online
- Physical Pentest Tools
- Pentest Tools For Ubuntu
- What Are Hacking Tools
- Hacker Techniques Tools And Incident Handling
- Hackrf Tools
- Blackhat Hacker Tools
- Pentest Tools Open Source
- Hacking Tools For Kali Linux
- Hack Tool Apk
- Pentest Tools
- Hacker Tools Mac
- Hack Tool Apk
- Hacker Tools Linux
- Hacking Tools 2020
- Best Hacking Tools 2020
- Usb Pentest Tools
- Hack Website Online Tool
- Tools 4 Hack
- Underground Hacker Sites
- Top Pentest Tools
- Nsa Hack Tools Download
- Hacking Tools Kit
- Hacking Tools Free Download
- Hacking Tools Windows 10
- Computer Hacker
- Hacker Tools For Mac
- What Is Hacking Tools
- Pentest Tools Free
- Hacking Tools 2020
- Hacking Tools Mac
- Hacker Security Tools
- Hacker Tools Linux
- Pentest Tools Tcp Port Scanner
- Game Hacking
- Hacker Tools Online
- Ethical Hacker Tools
- Hack And Tools
- Pentest Tools Subdomain
- Pentest Tools Github
- New Hack Tools
- What Is Hacking Tools
- Wifi Hacker Tools For Windows
- Nsa Hack Tools Download
- Pentest Tools Online
- Hacker Tools List
- Tools Used For Hacking
- Hack Tools
- Hack Tools Download
- Pentest Tools For Android
- Pentest Tools Port Scanner
- Blackhat Hacker Tools
- Hacking Tools Mac
- Pentest Tools Linux






0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home