CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related word
- Hacking Tools For Windows Free Download
- Hacker Tools Apk Download
- Hacker Tools 2019
- Hacker Tools For Ios
- Pentest Tools Website
- Hack Tools Download
- Install Pentest Tools Ubuntu
- Best Hacking Tools 2019
- Hacker Tools 2020
- Hacking Tools And Software
- Tools For Hacker
- Hack Tool Apk No Root
- Hack Apps
- Hacking Tools And Software
- Pentest Tools For Android
- Tools Used For Hacking
- Hacking Tools Free Download
- Pentest Tools For Windows
- Beginner Hacker Tools
- Hack Tools For Pc
- Hacker Search Tools
- Hack Tool Apk No Root
- Hacking Apps
- Hacker Tools Software
- Hack Tools Download
- Pentest Tools Framework
- Hack Tools
- Hacking Apps
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Mac
- Nsa Hack Tools Download
- Kik Hack Tools
- Hack Tools Github
- Hack Website Online Tool
- Tools 4 Hack
- Hack Tools For Pc
- Hack Tools For Mac
- Hacking Tools For Mac
- What Are Hacking Tools
- Hacker Tools For Ios
- Hacker Security Tools
- Ethical Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacker Tools Github
- Hacking Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Hacker Tools 2019
- Pentest Tools Subdomain
- Hacking Apps
- Hacking Tools Windows
- Pentest Tools For Mac
- Hack And Tools
- Hacker Tools Windows
- Physical Pentest Tools
- Pentest Tools Kali Linux
- New Hack Tools
- How To Hack
- Hacking Tools For Games
- Hacking Tools Name
- Pentest Box Tools Download
- Hacker Tools Github
- Hack Tools For Ubuntu
- Pentest Tools Find Subdomains
- Growth Hacker Tools
- Hacking Tools For Beginners
- Hack Website Online Tool
- Hack Tools For Windows
- Hacking Tools For Beginners
- Pentest Tools For Mac
- Hack Rom Tools
- Pentest Recon Tools
- Hacking Tools For Beginners
- Hacker Tools For Ios
- Beginner Hacker Tools
- Hack Tools 2019
- Pentest Tools Port Scanner
- Growth Hacker Tools
- Pentest Tools Port Scanner
- Pentest Tools Url Fuzzer
- Pentest Automation Tools
- Hack Tools Download
- Hackers Toolbox
- Hacking Tools 2020
- Pentest Tools Url Fuzzer
- Hacking Tools
- World No 1 Hacker Software
- Hacker Tools 2020
- Pentest Tools Download
- Pentest Tools Open Source
- Physical Pentest Tools
- Pentest Tools Port Scanner
- Black Hat Hacker Tools
- Best Hacking Tools 2020
- Pentest Tools Bluekeep
- Kik Hack Tools
- Hacking Tools Software
- Hacking Tools Windows
- Hacker Tools List
- Best Hacking Tools 2019
- Pentest Recon Tools
- Hacking Tools Download
- Hack Tools Github
- Pentest Tools Kali Linux
- Pentest Tools Framework
- Pentest Tools Framework
- Best Pentesting Tools 2018
- Pentest Tools Android
- Hacker Security Tools
- Hack Tools For Games
- Hacking Tools Usb
- Pentest Tools For Android
- Pentest Tools Port Scanner
- Hackrf Tools
- Hacker Tools 2020
- Hacker Tools For Ios
- Pentest Tools For Android
- Game Hacking
- Pentest Tools Online
- Ethical Hacker Tools
- Pentest Tools Framework
- Pentest Tools Linux
- What Is Hacking Tools
- Pentest Tools Download
- How To Install Pentest Tools In Ubuntu
- Pentest Tools For Windows
- Pentest Tools Github
- Hack Tools Pc
- Hacker Tools Online
- Hack Tool Apk
- Nsa Hacker Tools
- Hacker Tools Software
- Hacker Tools Apk
- Hacker Tools Software
Không có nhận xét nào:
Đăng nhận xét