Thursday, August 27, 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related word


  1. How To Install Pentest Tools In Ubuntu
  2. Best Pentesting Tools 2018
  3. Hacker Tools For Pc
  4. What Are Hacking Tools
  5. What Are Hacking Tools
  6. Hacking Tools 2019
  7. Hacker Tools Apk Download
  8. New Hacker Tools
  9. Hack Tools Mac
  10. World No 1 Hacker Software
  11. Hacking Tools Pc
  12. Hack Tools Mac
  13. Hacking Tools Free Download
  14. Tools For Hacker
  15. Hacking Tools Github
  16. Nsa Hacker Tools
  17. Bluetooth Hacking Tools Kali
  18. Hack Tools For Ubuntu
  19. Hacking Tools Name
  20. Easy Hack Tools
  21. Hacking Tools
  22. Hacker Security Tools
  23. New Hack Tools
  24. Tools For Hacker
  25. Pentest Tools Free
  26. Hack Tools For Ubuntu
  27. Hacker Tools Free
  28. Pentest Tools Review
  29. Hacking Tools Software
  30. Hack Tools For Mac
  31. Hack Tool Apk
  32. Hacking Tools For Games
  33. Hacking Tools For Windows
  34. Pentest Recon Tools
  35. Hack Apps
  36. Top Pentest Tools
  37. Hack Tools Mac
  38. Hack Tools For Pc
  39. Hacker Tools Windows
  40. Hack Rom Tools
  41. Hacking Tools For Beginners
  42. Pentest Tools Tcp Port Scanner
  43. Hack Tools For Pc
  44. Tools Used For Hacking
  45. Hack Tools For Windows
  46. Pentest Tools Find Subdomains
  47. Hacker Tools Linux
  48. New Hacker Tools
  49. Hacker Tools Apk Download
  50. Hackers Toolbox
  51. Pentest Tools Open Source
  52. Pentest Tools Framework
  53. How To Hack
  54. Pentest Tools For Windows
  55. Hacker Tools Github
  56. Pentest Tools Windows
  57. Hacker Search Tools
  58. Hacker Search Tools
  59. Hack Tools For Ubuntu
  60. Install Pentest Tools Ubuntu
  61. Termux Hacking Tools 2019

No comments:

Post a Comment