CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Continue reading
- Hacking Tools Windows 10
- What Are Hacking Tools
- Hacking Tools
- Pentest Tools Find Subdomains
- Black Hat Hacker Tools
- Pentest Tools For Ubuntu
- Pentest Tools List
- Hack Tools Pc
- Hacking Tools For Games
- Blackhat Hacker Tools
- Best Hacking Tools 2020
- Pentest Tools Bluekeep
- Hacking Tools Software
- Hacker Tools
- Github Hacking Tools
- Pentest Tools Subdomain
- Black Hat Hacker Tools
- Hacking Tools Online
- Hacker Tools Apk Download
- Best Pentesting Tools 2018
- Hacking Tools Github
- Hacker Tools 2019
- Pentest Tools List
- Hacker Tools For Mac
- Hacking Tools Mac
- Hacker Tools For Windows
- Hack Tools Pc
- Nsa Hack Tools
- Hacker Tools Online
- Hacker Tools Free Download
- Hacking Tools And Software
- New Hack Tools
- Pentest Tools Download
- Hacker Tools Mac
- Hacking Tools For Windows Free Download
- Hacker Tools For Ios
- Termux Hacking Tools 2019
- Pentest Tools Github
- Pentest Tools Online
- Hack Tools Pc
- Pentest Tools Github
- Hacking Tools Pc
- Hack Tools For Ubuntu
- Best Pentesting Tools 2018
- Pentest Tools Download
- Hacker Tools Linux
- Hacker Tools Free Download
- Pentest Tools Bluekeep
- Hack Tools For Mac
- Hacks And Tools
- Bluetooth Hacking Tools Kali
- Hack Tool Apk
- Pentest Tools For Ubuntu
- Pentest Tools Download
- Hacker
- Hack Tools
- Hacker Tools Software
- Termux Hacking Tools 2019
- Kik Hack Tools
- Pentest Tools Tcp Port Scanner
- New Hacker Tools
- Hack Tools
- Hack Tools Online
- Hacking Tools Free Download
- Beginner Hacker Tools
- Hack Tools For Pc
- Hacker Tools Online
- Pentest Tools Url Fuzzer
- Hacker Tools Software
- Hack Tools
- Kik Hack Tools
- Hacking Tools For Pc
- Pentest Tools For Android
- Hacking Tools Online
- Hacker Tools
- Hacking Tools For Kali Linux
- Pentest Box Tools Download
- Hacker Tools Free Download
- Hack Tools Online
- Hacking Tools Free Download
- How To Hack
- Hack Tool Apk
- Hack Tools Download
- Hacking Tools For Beginners
- Hacking Tools Name
- Beginner Hacker Tools
- Hacker Tools For Mac
- Pentest Tools Apk
- Hacking Tools For Windows
- Hacking Tools For Kali Linux
- Hacking App
- Pentest Tools Subdomain
- Hack Apps
- Install Pentest Tools Ubuntu
- Free Pentest Tools For Windows
- Hacker
- Pentest Tools Nmap
- Hack Tools For Mac
- Underground Hacker Sites
- Hacker Tools 2019
- Hacker Tools Free
- Best Hacking Tools 2020
- Hack Tool Apk No Root
- Hack And Tools
- Pentest Tools Url Fuzzer
- Hacking App
- World No 1 Hacker Software
- Pentest Tools Kali Linux
- Hack Tool Apk
- How To Make Hacking Tools
0 comments:
Post a Comment