CEH Exam Objectives:
Describe Reconnaissance.
Describe aggressive/competitive intelligence.
Reconnaissance
Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.Understand Aggressive Intelligence
Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.Online tools to gather competitive intelligence
Exercise 1.1
Using KeywordSpy
To use the KeywordSpy online tool to gather competitive intelligence information:- Go to the www.keywordspy.com website and enter the website address of the target in the search field
- Review the report and determine valuable keywords, links, or other information.
Exercise 1.2
Using spyfu
- Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.
Exercise 1.3
Using the EDGAR Database to Gather Information
1. Determine the company's stock symbol using Google.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
2. Open a web browser to www.sec.gov.
3. On the right side of the page, click the link EDGAR Filers.
4. Click the Search For Filings menu and enter the company name or stock symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.
Read more
- Hacking Tools For Windows 7
- Termux Hacking Tools 2019
- Pentest Tools Apk
- Hacker Tools Apk Download
- Nsa Hacker Tools
- Hacking Tools Usb
- Pentest Tools Apk
- Termux Hacking Tools 2019
- World No 1 Hacker Software
- Hacking Tools Name
- Pentest Tools Download
- Game Hacking
- Hacking App
- Hacker Tools For Mac
- Pentest Box Tools Download
- Pentest Tools Port Scanner
- Easy Hack Tools
- Hacking Apps
- Hack Tools For Games
- Hacker Tools For Mac
- Hacker Tool Kit
- Hacker Tools 2019
- Pentest Tools For Android
- Black Hat Hacker Tools
- Hacker Tools Windows
- Hack Tools For Games
- Hack Tools For Mac
- Hack Tools
- Top Pentest Tools
- Hacking Tools Name
- Hacker Security Tools
- Easy Hack Tools
- Hak5 Tools
- Hacking Tools For Beginners
- Pentest Tools Apk
- Hacking Tools For Pc
- Hacker Hardware Tools
- Hack Tools For Ubuntu
- Hacker Tools Free
- Hacking Tools For Pc
- Pentest Tools Kali Linux
- Hack Tools 2019
- Hack Tools
- Hack Tools For Mac
- Pentest Tools Online
- Hacking Tools Mac
- How To Hack
- Best Hacking Tools 2019
- Blackhat Hacker Tools
- Pentest Tools Free
- Pentest Tools Online
- Pentest Tools For Ubuntu
- Github Hacking Tools
- Hacker Tools Apk
- Hacking Tools Github
- Hacking Tools For Windows 7
- Pentest Recon Tools
- Hacker Tools For Windows
- Pentest Tools Website
- Pentest Tools For Android
- Hacking Tools Kit
- Hack Tools Pc
- Pentest Tools Bluekeep
- Hacker Search Tools
- Hack Tools For Games
- Hacker Tools 2020
- Free Pentest Tools For Windows
- Hack Tools Mac
- Hacks And Tools
- Hacker Tools Github
- Top Pentest Tools
- Nsa Hacker Tools
- Hacking Tools For Mac
- Hacking Tools Free Download
- Hacker Tools Apk Download
- Hacking App
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Windows 10
- Hacker Tools Free
- Hack Tools For Windows
- Pentest Tools Subdomain
- Hacker Tools Github
- Pentest Tools For Windows
- Pentest Tools For Windows
- Pentest Tools Subdomain
- Underground Hacker Sites
- Hacking Tools Hardware
- Kik Hack Tools
- Pentest Reporting Tools
- Physical Pentest Tools
- Hack Tools Pc
- Pentest Tools Online
- Hacker Tools Free Download
- Hacking App
- How To Install Pentest Tools In Ubuntu
- Hackers Toolbox
- Hacker Tools For Mac
- Hacker Tools Mac
- Hacking Tools Free Download
- Hacker Techniques Tools And Incident Handling