CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Related links
- Hack Rom Tools
- Hacker Security Tools
- Pentest Tools Url Fuzzer
- Hack Tools
- Hacking Tools For Kali Linux
- Pentest Tools Review
- Hacking Tools 2020
- Hacker Tools For Pc
- Hacker Tools 2020
- Hacker
- Best Pentesting Tools 2018
- Hacking Tools Windows
- Hacker Tools Github
- Pentest Automation Tools
- Hacking Tools For Mac
- Hackrf Tools
- Hacking Tools Software
- Hacker Tools For Windows
- Hacker Tools 2020
- Hacking Tools Github
- Pentest Tools List
- Hacker Security Tools
- Hacker Tools Linux
- Beginner Hacker Tools
- Best Hacking Tools 2020
- Pentest Tools Github
- Free Pentest Tools For Windows
- Best Hacking Tools 2020
- Hacking Tools For Pc
- How To Hack
- Growth Hacker Tools
- Hacker Tools Hardware
- Hacker Tools Free Download
- Pentest Tools Review
- Pentest Tools Github
- Pentest Tools For Android
- Nsa Hack Tools Download
- Pentest Tools Github
- Hacker Tools 2019
- Hacker Security Tools
- Pentest Tools Website Vulnerability
- Pentest Tools For Mac
- Wifi Hacker Tools For Windows
- Usb Pentest Tools
- How To Install Pentest Tools In Ubuntu
- Hack Apps
- Tools 4 Hack
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Games
- Beginner Hacker Tools
- Pentest Tools Download
- Pentest Tools Online
- Tools Used For Hacking
- Computer Hacker
- Nsa Hacker Tools
- Hacker Tools 2019
- Top Pentest Tools
- Hack Tools Github
- Pentest Tools Url Fuzzer
- Underground Hacker Sites
- Hacking Tools 2019
- New Hacker Tools
- Hacker Tools Free Download
- Hack Tools 2019
- Usb Pentest Tools
- Hack Tools For Ubuntu
- Hacking Tools Software
- Pentest Tools Kali Linux
- Hacking Tools 2019
- Pentest Tools
- Hack Tools 2019
- Best Hacking Tools 2020
- Ethical Hacker Tools
- Hacker Tool Kit
- Hacker
- Pentest Tools For Ubuntu
- Hacking Tools Github
- Blackhat Hacker Tools
- Game Hacking
- New Hacker Tools
- Hack Tools Mac
- Hacking Tools Name
- Android Hack Tools Github
- New Hacker Tools
- Best Pentesting Tools 2018
- Tools Used For Hacking
- Blackhat Hacker Tools
- Hacker Tools For Pc
- Hack Website Online Tool
- Physical Pentest Tools
- Pentest Tools
- Hacking Tools Online
- Hack Tools Online
- Hacker Tools For Mac
- Bluetooth Hacking Tools Kali
- Hacker Tools 2019
- Pentest Tools Tcp Port Scanner
- Pentest Tools Review
- Top Pentest Tools
- Hack Tools Pc
- Black Hat Hacker Tools
- Best Hacking Tools 2019
- World No 1 Hacker Software
- Hacker Tools Free
- Hacker Tools Linux
- Hacking Tools Pc
- Pentest Tools Nmap
- Hack Tools For Ubuntu
- Hacking Tools 2019
- Pentest Tools Find Subdomains
- Tools Used For Hacking
- Hack Apps
- Hack Tools
- Hack Tool Apk
- Pentest Tools Kali Linux
- What Are Hacking Tools
- Hackrf Tools
- Pentest Tools For Windows
- Hacking Tools For Windows Free Download
- Hacking Tools Software
- Hack Tools
- Hacking Tools Download
- New Hacker Tools
- Pentest Tools Linux
- Hacks And Tools
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Open Source
- Pentest Recon Tools
- Hackrf Tools
- Pentest Tools
- Black Hat Hacker Tools
- Best Hacking Tools 2019
- Hacker
- How To Make Hacking Tools
- Tools 4 Hack




沒有留言:
張貼留言