CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
More info
- Hack Tools Download
- Hacking Tools For Beginners
- Best Pentesting Tools 2018
- Wifi Hacker Tools For Windows
- Ethical Hacker Tools
- Hacking Tools Pc
- Hacks And Tools
- Hacker Tools 2019
- Hacker Tools Free
- Hack And Tools
- Hack And Tools
- Wifi Hacker Tools For Windows
- Best Hacking Tools 2020
- Hacker Hardware Tools
- Hacker Tools
- Install Pentest Tools Ubuntu
- Pentest Tools For Mac
- Hack App
- Hack Tools For Windows
- Best Hacking Tools 2019
- Hacking Tools Free Download
- Tools 4 Hack
- New Hacker Tools
- Hacking Tools Pc
- Pentest Tools For Windows
- Tools For Hacker
- Hacking Tools Name
- Hacker Tools For Mac
- Hackrf Tools
- Hacking Tools Github
- Pentest Tools Kali Linux
- Underground Hacker Sites
- Pentest Tools Android
- Underground Hacker Sites
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Mac
- Growth Hacker Tools
- Hack Tools 2019
- Hacker Tools Windows
- Hack Tools Github
- Hacker Tools Online
- Hack Website Online Tool
- Pentest Reporting Tools
- Hacking Tools For Windows 7
- Termux Hacking Tools 2019
- Pentest Tools Open Source
- Nsa Hack Tools Download
- Nsa Hacker Tools
- Hack Rom Tools
- Hacker Tool Kit
- Black Hat Hacker Tools
- Hacking Tools Name
- Hacker Tools Apk
- Pentest Tools Online
- Hacking Tools
- Hack Tools Mac
- Hacking Tools
- Hack Tools Github
- Hacker Tools Online
- Ethical Hacker Tools
- Pentest Tools For Windows
- Hacker Tools For Pc
- Hacking Tools Github
- Hacking Tools For Windows Free Download
- Hacking App
- Hacker Tools For Ios
- Nsa Hacker Tools
- Hack Tools Pc
- Pentest Tools Android
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Find Subdomains
- Hacking Tools Software
- Hacking Tools
- Blackhat Hacker Tools
- Best Pentesting Tools 2018
- Hacker Tools 2019
- Hacker Techniques Tools And Incident Handling
- How To Hack
- Hacker Tools For Pc
- How To Make Hacking Tools
- Best Hacking Tools 2020
- Pentest Tools Github
- Pentest Tools Find Subdomains
- What Is Hacking Tools
- Hacker Tools Apk Download
- What Are Hacking Tools
- Hacker Tools For Ios
- Pentest Tools Tcp Port Scanner
- Hack Tools Online
- Hacking Tools For Beginners
- Pentest Tools Github
- Easy Hack Tools
- Hacking Tools Windows
- Best Pentesting Tools 2018
- Hack Tools Pc
- Best Hacking Tools 2019
- Hack Tool Apk
- Pentest Tools Linux
- Pentest Tools For Windows
- Hacking Tools For Windows 7
- Pentest Tools Windows
- Physical Pentest Tools
- Top Pentest Tools
- Pentest Tools Download
- Best Hacking Tools 2019
- Hacker Tools Github
- Hacker Tools Software
- Pentest Tools Download
- Github Hacking Tools
- Pentest Tools Review
- Pentest Recon Tools
- Hack Tools For Ubuntu
- Android Hack Tools Github
- Hacking App
- Hack Tool Apk
- Hacker Tools Free
- Pentest Tools Nmap
- Hacking Tools For Kali Linux
- Hacking Tools Software
- Pentest Tools Port Scanner
- Nsa Hack Tools Download
- Growth Hacker Tools
- Hacker Tools Mac
- Pentest Tools Github
- World No 1 Hacker Software
- Hacker Tools Free
- Termux Hacking Tools 2019
- Hack Tools Pc
- Best Hacking Tools 2019
- Hacking Tools Kit
- Best Hacking Tools 2019
- Hack Tools For Pc
Tidak ada komentar:
Posting Komentar