Sottolineature pescate qua e la quando capita

sabato 22 agosto 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Read more


  1. Hacking Tools For Windows 7
  2. Termux Hacking Tools 2019
  3. Pentest Tools Apk
  4. Hacker Tools Apk Download
  5. Nsa Hacker Tools
  6. Hacking Tools Usb
  7. Pentest Tools Apk
  8. Termux Hacking Tools 2019
  9. World No 1 Hacker Software
  10. Hacking Tools Name
  11. Pentest Tools Download
  12. Game Hacking
  13. Hacking App
  14. Hacker Tools For Mac
  15. Pentest Box Tools Download
  16. Pentest Tools Port Scanner
  17. Easy Hack Tools
  18. Hacking Apps
  19. Hack Tools For Games
  20. Hacker Tools For Mac
  21. Hacker Tool Kit
  22. Hacker Tools 2019
  23. Pentest Tools For Android
  24. Black Hat Hacker Tools
  25. Hacker Tools Windows
  26. Hack Tools For Games
  27. Hack Tools For Mac
  28. Hack Tools
  29. Top Pentest Tools
  30. Hacking Tools Name
  31. Hacker Security Tools
  32. Easy Hack Tools
  33. Hak5 Tools
  34. Hacking Tools For Beginners
  35. Pentest Tools Apk
  36. Hacking Tools For Pc
  37. Hacker Hardware Tools
  38. Hack Tools For Ubuntu
  39. Hacker Tools Free
  40. Hacking Tools For Pc
  41. Pentest Tools Kali Linux
  42. Hack Tools 2019
  43. Hack Tools
  44. Hack Tools For Mac
  45. Pentest Tools Online
  46. Hacking Tools Mac
  47. How To Hack
  48. Best Hacking Tools 2019
  49. Blackhat Hacker Tools
  50. Pentest Tools Free
  51. Pentest Tools Online
  52. Pentest Tools For Ubuntu
  53. Github Hacking Tools
  54. Hacker Tools Apk
  55. Hacking Tools Github
  56. Hacking Tools For Windows 7
  57. Pentest Recon Tools
  58. Hacker Tools For Windows
  59. Pentest Tools Website
  60. Pentest Tools For Android
  61. Hacking Tools Kit
  62. Hack Tools Pc
  63. Pentest Tools Bluekeep
  64. Hacker Search Tools
  65. Hack Tools For Games
  66. Hacker Tools 2020
  67. Free Pentest Tools For Windows
  68. Hack Tools Mac
  69. Hacks And Tools
  70. Hacker Tools Github
  71. Top Pentest Tools
  72. Nsa Hacker Tools
  73. Hacking Tools For Mac
  74. Hacking Tools Free Download
  75. Hacker Tools Apk Download
  76. Hacking App
  77. Hacker Techniques Tools And Incident Handling
  78. Hacking Tools Windows 10
  79. Hacker Tools Free
  80. Hack Tools For Windows
  81. Pentest Tools Subdomain
  82. Hacker Tools Github
  83. Pentest Tools For Windows
  84. Pentest Tools For Windows
  85. Pentest Tools Subdomain
  86. Underground Hacker Sites
  87. Hacking Tools Hardware
  88. Kik Hack Tools
  89. Pentest Reporting Tools
  90. Physical Pentest Tools
  91. Hack Tools Pc
  92. Pentest Tools Online
  93. Hacker Tools Free Download
  94. Hacking App
  95. How To Install Pentest Tools In Ubuntu
  96. Hackers Toolbox
  97. Hacker Tools For Mac
  98. Hacker Tools Mac
  99. Hacking Tools Free Download
  100. Hacker Techniques Tools And Incident Handling

Lettori fissi

Archivio blog