Saturday, August 29, 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related news


  1. Pentest Tools Download
  2. Hack Tools 2019
  3. Hacking Tools For Windows 7
  4. Hack Tools Pc
  5. Hacker Tools Hardware
  6. New Hacker Tools
  7. Hacking Tools Free Download
  8. Hacker Tools For Mac
  9. Hack App
  10. Hacks And Tools
  11. Hacker Techniques Tools And Incident Handling
  12. Pentest Tools Free
  13. Hacking Tools 2019
  14. Nsa Hacker Tools
  15. Hacker Tools Online
  16. Hacking Tools For Windows 7
  17. Termux Hacking Tools 2019
  18. What Are Hacking Tools
  19. Hack Tool Apk No Root
  20. Hacker Tools For Mac
  21. Android Hack Tools Github
  22. Hacking Tools Windows
  23. Pentest Tools Windows
  24. Nsa Hack Tools
  25. Hacking Tools 2020
  26. Growth Hacker Tools
  27. Hacking Tools For Windows
  28. Hacking Tools Kit
  29. Pentest Tools Open Source
  30. How To Hack
  31. Hack And Tools
  32. Pentest Automation Tools
  33. Pentest Tools Open Source
  34. Blackhat Hacker Tools
  35. Pentest Tools Kali Linux
  36. Pentest Tools Website
  37. Android Hack Tools Github
  38. Hacking Tools Windows
  39. Hacker Tools Free Download
  40. Pentest Tools Url Fuzzer
  41. Hacker Tools Free
  42. Hacker Security Tools
  43. Hacker Tools Free Download
  44. Hacking Tools For Pc
  45. Pentest Tools Kali Linux
  46. Pentest Tools Free
  47. Hacker Tools 2019
  48. Nsa Hack Tools Download
  49. Pentest Tools Apk
  50. Pentest Reporting Tools
  51. Pentest Tools Website
  52. Hacker Tools Apk Download
  53. Hack Rom Tools
  54. Bluetooth Hacking Tools Kali
  55. Hacking Tools Online
  56. Hacking Apps
  57. Hack Tools
  58. Pentest Tools Alternative
  59. Pentest Tools Bluekeep
  60. How To Install Pentest Tools In Ubuntu
  61. Hacking Tools Hardware
  62. Pentest Tools Android
  63. Easy Hack Tools
  64. Hack Tool Apk No Root
  65. Install Pentest Tools Ubuntu
  66. Hacking Tools
  67. Pentest Tools Nmap
  68. Hacker Tools Apk
  69. Pentest Tools Review

No comments:

Post a Comment