CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related word
- Pentest Tools Website
- Hacking Tools Mac
- Hacking Tools For Games
- How To Make Hacking Tools
- Hacker
- How To Install Pentest Tools In Ubuntu
- Pentest Recon Tools
- Hacking Tools Online
- World No 1 Hacker Software
- Hacking Tools For Windows 7
- Hacker
- Hacker Tools
- Github Hacking Tools
- Kik Hack Tools
- Termux Hacking Tools 2019
- Hacking Tools For Windows
- Hacker Tools For Mac
- Pentest Tools Alternative
- Hacking Tools Download
- Hacker Tools Linux
- Hacker Tool Kit
- New Hack Tools
- Hacking Tools Github
- Pentest Tools For Windows
- New Hacker Tools
- Pentest Tools Subdomain
- Tools Used For Hacking
- Hacking Tools Software
- Hacker Tools Software
- Pentest Tools Download
- Hacker
- Hacker Tools Mac
- Beginner Hacker Tools
- Nsa Hack Tools
- Nsa Hack Tools
- What Is Hacking Tools
- Bluetooth Hacking Tools Kali
- New Hacker Tools
- Ethical Hacker Tools
- Hacking Tools Github
- Pentest Tools Review
- Github Hacking Tools
- Pentest Recon Tools
- Tools Used For Hacking
- Pentest Tools
- Hacking Tools 2019
- Pentest Tools Website
- Hacking Apps
- Nsa Hack Tools
- Hackrf Tools
- Hacker Tools Free Download
- Hacker Hardware Tools
- Hackrf Tools
- Hacker Tools Apk
- Beginner Hacker Tools
- Android Hack Tools Github
- Pentest Tools Subdomain
- Hacking Tools Github
- Hack Tools For Mac
- Underground Hacker Sites
- Hacking Tools Free Download
- Pentest Tools List
- Hacker Tools List
- Pentest Tools Website
- Blackhat Hacker Tools
- Hacking Tools Download
- Wifi Hacker Tools For Windows
- Hacking Tools For Windows 7
- Pentest Tools Find Subdomains
- Hacking Tools For Mac
- Kik Hack Tools
- Hacker Tools Windows
- Wifi Hacker Tools For Windows
- Pentest Tools List
- Pentest Tools Website
- Hack Tools
- Blackhat Hacker Tools
- Easy Hack Tools
- Hacking Tools
- Pentest Tools List
- Nsa Hack Tools
- Hacker Tools Free Download
- Top Pentest Tools
- Best Hacking Tools 2019
- Hack Tools 2019
- Hacking Tools For Games
- Hacker Tool Kit
- Nsa Hack Tools
- Hacker Tools Mac
- Hacking Apps
- Hacks And Tools
- Tools For Hacker
- Hacking Tools
- Hacker Tools Software
- Tools Used For Hacking
- Ethical Hacker Tools
- Hack Tools 2019
- Hacker Hardware Tools
- Pentest Tools Url Fuzzer
- Usb Pentest Tools
- Hacking Apps
- Best Hacking Tools 2020
- Pentest Tools Open Source
- Hack Tools
- Pentest Tools Android
- Hacking Tools For Mac
- Github Hacking Tools
- Install Pentest Tools Ubuntu
- Hacker Tools 2019
- Hacker Tools Hardware
- Pentest Tools Apk
- Pentest Tools Android
- Pentest Tools
- Hack Tool Apk
- Nsa Hacker Tools
- Pentest Automation Tools
- Hacker Tools For Windows
- Nsa Hack Tools Download
- Pentest Tools Bluekeep
- Hackers Toolbox
- Ethical Hacker Tools
- Hacking Tools
- Pentest Tools Open Source
- Hacker Techniques Tools And Incident Handling
- Hacking App
- Top Pentest Tools
- Hacking Tools Hardware
- Hacking Tools 2019
- How To Hack
- World No 1 Hacker Software
- Hackers Toolbox
- Hack Tools
- Hacking Apps
- Hack And Tools
- Ethical Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Hacker
- Hack Apps
- Hacking Tools For Beginners
- Nsa Hack Tools Download
- Hacker Tools Online
- Hacker Tools
- Pentest Tools Android
- Hacker Tools
- Hacker
- Hackrf Tools
- Hack Tools Github
- Hacking Tools Windows
- Pentest Recon Tools
- World No 1 Hacker Software
- Game Hacking
- Tools 4 Hack
- Hack Tools For Windows
- Pentest Tools For Android
- Hacker Tools Apk Download
- Hacking Tools Hardware
- Hacking Tools Hardware
- Pentest Tools Free
- Hacker Tools For Pc
- Hacking Tools Hardware
- Pentest Tools Kali Linux
- Hack Tools Github
- Tools 4 Hack
- Hacker Tools Github
- Pentest Box Tools Download
- Hacker Tool Kit
- Pentest Tools Port Scanner
- Hacker Tools List
- Pentest Tools Framework
- Android Hack Tools Github
- Pentest Tools Port Scanner
- Pentest Tools
- Hacker Tools Windows
No comments:
Post a Comment