CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related word
- How To Install Pentest Tools In Ubuntu
- Best Pentesting Tools 2018
- Hacker Tools For Pc
- What Are Hacking Tools
- What Are Hacking Tools
- Hacking Tools 2019
- Hacker Tools Apk Download
- New Hacker Tools
- Hack Tools Mac
- World No 1 Hacker Software
- Hacking Tools Pc
- Hack Tools Mac
- Hacking Tools Free Download
- Tools For Hacker
- Hacking Tools Github
- Nsa Hacker Tools
- Bluetooth Hacking Tools Kali
- Hack Tools For Ubuntu
- Hacking Tools Name
- Easy Hack Tools
- Hacking Tools
- Hacker Security Tools
- New Hack Tools
- Tools For Hacker
- Pentest Tools Free
- Hack Tools For Ubuntu
- Hacker Tools Free
- Pentest Tools Review
- Hacking Tools Software
- Hack Tools For Mac
- Hack Tool Apk
- Hacking Tools For Games
- Hacking Tools For Windows
- Pentest Recon Tools
- Hack Apps
- Top Pentest Tools
- Hack Tools Mac
- Hack Tools For Pc
- Hacker Tools Windows
- Hack Rom Tools
- Hacking Tools For Beginners
- Pentest Tools Tcp Port Scanner
- Hack Tools For Pc
- Tools Used For Hacking
- Hack Tools For Windows
- Pentest Tools Find Subdomains
- Hacker Tools Linux
- New Hacker Tools
- Hacker Tools Apk Download
- Hackers Toolbox
- Pentest Tools Open Source
- Pentest Tools Framework
- How To Hack
- Pentest Tools For Windows
- Hacker Tools Github
- Pentest Tools Windows
- Hacker Search Tools
- Hacker Search Tools
- Hack Tools For Ubuntu
- Install Pentest Tools Ubuntu
- Termux Hacking Tools 2019
No comments:
Post a Comment