CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
More articles
- Easy Hack Tools
- Hacking Tools Windows
- Install Pentest Tools Ubuntu
- Pentest Tools
- Pentest Tools For Mac
- Hacker Tools Apk Download
- Physical Pentest Tools
- Hacking Tools Hardware
- Hacking Tools Mac
- Hack Tools For Windows
- Blackhat Hacker Tools
- Hack Tool Apk No Root
- Hack Tools Online
- Hack Apps
- World No 1 Hacker Software
- Pentest Tools Website
- Hacker Tools Free Download
- Pentest Recon Tools
- New Hacker Tools
- Hacker Tools Mac
- Bluetooth Hacking Tools Kali
- Hacking Tools For Pc
- Nsa Hack Tools
- Hacker Tools Free
- Hacking Tools Download
- Pentest Tools Android
- Hackrf Tools
- Hak5 Tools
- Pentest Tools List
- Hacking Tools For Kali Linux
- Hacker Security Tools
- Hacker Hardware Tools
- Hack Tools Download
- Hacker Tool Kit
- Hacker Tools Apk
- New Hacker Tools
- Hack Tools Pc
- Pentest Tools Bluekeep
- Pentest Tools For Android
- Hacker Tools 2019
- Hack Tools Online
- Beginner Hacker Tools
- Pentest Tools Website
- Pentest Tools Website Vulnerability
- Hacking Tools
- Hackers Toolbox
- Nsa Hacker Tools
- Nsa Hacker Tools
- Hack Apps
- Nsa Hacker Tools
- How To Make Hacking Tools
- Pentest Tools List
- Hackrf Tools
- Hackers Toolbox
- Hacker Tools For Pc
- Hacker Tools Apk
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Windows 10
- Hack Tools For Games
- Github Hacking Tools
- Bluetooth Hacking Tools Kali
- Top Pentest Tools
- Pentest Tools Url Fuzzer
- Nsa Hack Tools
- Pentest Tools For Ubuntu
- Hacking Tools Windows 10
- Hacker Tools For Windows
- Best Pentesting Tools 2018
- Underground Hacker Sites
- Hacker Tools Online
- Pentest Tools Nmap
- Pentest Tools Find Subdomains
- Pentest Recon Tools
- Hacking App
- What Are Hacking Tools
- Hack Tool Apk No Root
- Game Hacking
- Hack App
- Hacking Tools Github
- Hacker Techniques Tools And Incident Handling
- Hacker Search Tools
- Hacking App
- Hacker Tools Windows
- Pentest Recon Tools
- Hacking Tools For Games
- Hacker Tools Github
- Hacking Tools Free Download
- Pentest Tools Linux
- New Hack Tools
- Hacking Tools Windows
- Hacking App
- Hacking Tools For Pc
- Free Pentest Tools For Windows
- Hackers Toolbox
- Hacker Tools Online
- Hacking Tools 2019
- Ethical Hacker Tools
- Physical Pentest Tools
- Pentest Tools Website
- Hack Tools For Windows
- Pentest Tools For Ubuntu
- Hack Tool Apk
- What Is Hacking Tools
- Easy Hack Tools
- Pentest Tools Website
Nenhum comentário:
Postar um comentário