viernes, 21 de agosto de 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related links
  1. How To Make Hacking Tools
  2. Hacker
  3. Free Pentest Tools For Windows
  4. Hacking Tools Name
  5. Hacker Tools For Pc
  6. Hack Tools For Games
  7. Pentest Tools Online
  8. Hacking Tools Download
  9. Pentest Tools Download
  10. Hacking Tools For Windows 7
  11. Blackhat Hacker Tools
  12. Github Hacking Tools
  13. Bluetooth Hacking Tools Kali
  14. Ethical Hacker Tools
  15. Wifi Hacker Tools For Windows
  16. Best Hacking Tools 2019
  17. World No 1 Hacker Software
  18. What Is Hacking Tools
  19. Pentest Tools Review
  20. Hacking Tools Kit
  21. Pentest Tools Free
  22. Hacking Tools For Mac
  23. Hacking Tools For Pc
  24. Pentest Tools For Windows
  25. Pentest Tools Windows
  26. Hack Rom Tools
  27. Easy Hack Tools
  28. Hacking Tools For Windows Free Download
  29. Hacking Tools Free Download
  30. Hacking Tools Usb
  31. Physical Pentest Tools
  32. Pentest Reporting Tools
  33. Beginner Hacker Tools
  34. Pentest Tools Apk
  35. Physical Pentest Tools
  36. Tools For Hacker
  37. Hack Tool Apk
  38. Hacking Tools Pc
  39. Pentest Box Tools Download
  40. Pentest Tools Apk
  41. Hack App
  42. New Hacker Tools
  43. Physical Pentest Tools
  44. World No 1 Hacker Software
  45. Hack App
  46. Hack Tools For Pc
  47. Hack Website Online Tool
  48. Pentest Tools Review
  49. Best Pentesting Tools 2018
  50. Hacking Tools For Beginners
  51. Tools Used For Hacking
  52. Hacking Tools Kit
  53. Hacking Tools Windows 10
  54. Hacker Security Tools
  55. Underground Hacker Sites
  56. Underground Hacker Sites
  57. Pentest Tools Linux
  58. Pentest Tools Online
  59. Pentest Tools Bluekeep
  60. Hack Tools For Ubuntu
  61. Hack Tools Github
  62. Hacker Techniques Tools And Incident Handling
  63. Hack Tools Pc
  64. Pentest Tools Port Scanner
  65. Termux Hacking Tools 2019
  66. Nsa Hacker Tools
  67. Pentest Tools Nmap
  68. Pentest Tools For Windows
  69. Hacking App
  70. Hack Tool Apk No Root
  71. What Are Hacking Tools
  72. Pentest Tools Windows
  73. Hacker Techniques Tools And Incident Handling
  74. Hack Tools Github
  75. Hacking Tools For Games
  76. Hacking Tools Download
  77. Github Hacking Tools
  78. New Hack Tools
  79. Hacking Tools 2019
  80. How To Make Hacking Tools
  81. Hacking Tools For Kali Linux
  82. Hack Tools 2019
  83. Pentest Tools Find Subdomains
  84. Hack Website Online Tool
  85. Hacker Tools For Ios
  86. Hacker Tools Hardware
  87. Blackhat Hacker Tools
  88. Hacker Tools For Pc
  89. Hacking Tools Pc
  90. Hack Tools For Windows
  91. Hacking Tools 2019
  92. Hacking Tools For Pc
  93. Hack Tools For Windows
  94. Hacking Tools For Mac
  95. Pentest Tools Apk
  96. Pentest Box Tools Download
  97. Hack Tools
  98. Hacker Tools Github

No hay comentarios:

Publicar un comentario