22 August 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related links
  1. Hacker Tools Free
  2. Pentest Tools Framework
  3. Tools 4 Hack
  4. Hack Tools For Windows
  5. Hack Rom Tools
  6. Pentest Tools
  7. Hacks And Tools
  8. Pentest Tools Free
  9. What Is Hacking Tools
  10. Best Pentesting Tools 2018
  11. Bluetooth Hacking Tools Kali
  12. Hacking Tools For Windows Free Download
  13. Hacker Tools For Ios
  14. Tools 4 Hack
  15. Hack Tools For Mac
  16. World No 1 Hacker Software
  17. Hacking Tools Windows
  18. Hack And Tools
  19. Hacker Tools Linux
  20. Hacking Tools Windows 10
  21. Hacking Apps
  22. Best Hacking Tools 2020
  23. Hacking Tools 2019
  24. Hacker Tools Online
  25. Hacking Tools For Kali Linux
  26. Kik Hack Tools
  27. Hacking Tools Windows 10
  28. Pentest Box Tools Download
  29. Hacker Tools Free Download
  30. Hacking Tools Kit
  31. Hacker Tools Software
  32. Pentest Tools For Ubuntu
  33. Hackers Toolbox
  34. Hacking Tools For Mac
  35. Hacking Tools For Windows 7
  36. Pentest Box Tools Download
  37. Hack Tools Mac
  38. Pentest Tools Online
  39. Nsa Hack Tools
  40. Hack Tools Mac
  41. Hacking Tools For Windows
  42. Beginner Hacker Tools
  43. Hack Rom Tools
  44. Pentest Tools For Windows
  45. Hacking Tools Name
  46. Black Hat Hacker Tools
  47. Hacking Tools Name
  48. Hacker Tools 2020
  49. Hack App
  50. Black Hat Hacker Tools
  51. Hacker Techniques Tools And Incident Handling
  52. Pentest Tools Free
  53. Hack App
  54. Nsa Hacker Tools
  55. Pentest Tools For Windows
  56. What Are Hacking Tools
  57. Hackers Toolbox
  58. Hacking Tools For Beginners
  59. Hacker Tools For Pc
  60. Hacking Tools Windows 10

No comments: