CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related links
- How To Make Hacking Tools
- Hacker
- Free Pentest Tools For Windows
- Hacking Tools Name
- Hacker Tools For Pc
- Hack Tools For Games
- Pentest Tools Online
- Hacking Tools Download
- Pentest Tools Download
- Hacking Tools For Windows 7
- Blackhat Hacker Tools
- Github Hacking Tools
- Bluetooth Hacking Tools Kali
- Ethical Hacker Tools
- Wifi Hacker Tools For Windows
- Best Hacking Tools 2019
- World No 1 Hacker Software
- What Is Hacking Tools
- Pentest Tools Review
- Hacking Tools Kit
- Pentest Tools Free
- Hacking Tools For Mac
- Hacking Tools For Pc
- Pentest Tools For Windows
- Pentest Tools Windows
- Hack Rom Tools
- Easy Hack Tools
- Hacking Tools For Windows Free Download
- Hacking Tools Free Download
- Hacking Tools Usb
- Physical Pentest Tools
- Pentest Reporting Tools
- Beginner Hacker Tools
- Pentest Tools Apk
- Physical Pentest Tools
- Tools For Hacker
- Hack Tool Apk
- Hacking Tools Pc
- Pentest Box Tools Download
- Pentest Tools Apk
- Hack App
- New Hacker Tools
- Physical Pentest Tools
- World No 1 Hacker Software
- Hack App
- Hack Tools For Pc
- Hack Website Online Tool
- Pentest Tools Review
- Best Pentesting Tools 2018
- Hacking Tools For Beginners
- Tools Used For Hacking
- Hacking Tools Kit
- Hacking Tools Windows 10
- Hacker Security Tools
- Underground Hacker Sites
- Underground Hacker Sites
- Pentest Tools Linux
- Pentest Tools Online
- Pentest Tools Bluekeep
- Hack Tools For Ubuntu
- Hack Tools Github
- Hacker Techniques Tools And Incident Handling
- Hack Tools Pc
- Pentest Tools Port Scanner
- Termux Hacking Tools 2019
- Nsa Hacker Tools
- Pentest Tools Nmap
- Pentest Tools For Windows
- Hacking App
- Hack Tool Apk No Root
- What Are Hacking Tools
- Pentest Tools Windows
- Hacker Techniques Tools And Incident Handling
- Hack Tools Github
- Hacking Tools For Games
- Hacking Tools Download
- Github Hacking Tools
- New Hack Tools
- Hacking Tools 2019
- How To Make Hacking Tools
- Hacking Tools For Kali Linux
- Hack Tools 2019
- Pentest Tools Find Subdomains
- Hack Website Online Tool
- Hacker Tools For Ios
- Hacker Tools Hardware
- Blackhat Hacker Tools
- Hacker Tools For Pc
- Hacking Tools Pc
- Hack Tools For Windows
- Hacking Tools 2019
- Hacking Tools For Pc
- Hack Tools For Windows
- Hacking Tools For Mac
- Pentest Tools Apk
- Pentest Box Tools Download
- Hack Tools
- Hacker Tools Github
No hay comentarios:
Publicar un comentario