Mrs. King - School Year 2010-2011

Thursday, August 27, 2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

More articles


  1. Hacking Tools Kit
  2. Hack Tools 2019
  3. What Are Hacking Tools
  4. Pentest Tools Download
  5. Hackrf Tools
  6. Pentest Tools Kali Linux
  7. Hacking Tools Download
  8. Nsa Hacker Tools
  9. Hacker Tools Hardware
  10. Hacker Tool Kit
  11. Pentest Box Tools Download
  12. Bluetooth Hacking Tools Kali
  13. Pentest Tools Free
  14. Hacking Tools
  15. Hacker Hardware Tools
  16. Pentest Tools Online
  17. New Hacker Tools
  18. Hacking Tools For Beginners
  19. Hacking Tools Mac
  20. Pentest Tools Download
  21. Computer Hacker
  22. Hacking Tools For Kali Linux
  23. Bluetooth Hacking Tools Kali
  24. Blackhat Hacker Tools
  25. Hack Tools
  26. Hack Tools
  27. Hacker Tools Mac
  28. Hack Tools For Mac
  29. Hacking Tools Github
  30. Hack Apps
  31. Computer Hacker
  32. Hacking Tools For Pc
  33. Hacking Tools For Kali Linux
  34. Underground Hacker Sites
  35. Hacking Tools Windows
  36. Hacker Tools 2019
  37. Hacker Tools Hardware
  38. Hacker Tools Mac
  39. Hack App
  40. Hacker Tools For Ios
  41. Pentest Tools Find Subdomains
  42. Hacks And Tools
  43. Hacker Tools Windows
  44. How To Install Pentest Tools In Ubuntu
  45. Hack And Tools
  46. Hacker Tools Mac
  47. What Are Hacking Tools
  48. Pentest Tools Free
  49. Pentest Tools Bluekeep
  50. Hacking Tools Hardware
  51. Pentest Tools Review
  52. Black Hat Hacker Tools
  53. Hacker Tools 2020
  54. Pentest Automation Tools
  55. Game Hacking
  56. Termux Hacking Tools 2019
  57. Pentest Tools Linux
  58. Hacker Tools Windows
  59. Game Hacking
  60. Hacker Tools Apk Download
  61. Install Pentest Tools Ubuntu
  62. Hack Tools For Games
  63. Hacking Tools For Kali Linux
  64. Hacking Tools Windows
  65. Pentest Automation Tools
  66. Pentest Tools Url Fuzzer
  67. Hacker Tools Mac
  68. Hacking Tools For Windows
  69. Pentest Tools Linux
  70. Hack Tools For Pc
  71. Hack Apps
  72. Top Pentest Tools
  73. Hacking Tools Pc
  74. Top Pentest Tools
  75. Tools For Hacker
  76. Hacker Hardware Tools
  77. How To Hack
  78. Hacking Tools 2020
  79. Hacks And Tools
  80. Best Hacking Tools 2019
  81. Hacking Tools Software
  82. New Hacker Tools
  83. Hacking Tools
  84. What Is Hacking Tools
  85. Ethical Hacker Tools
  86. Hack Tools For Mac
  87. Underground Hacker Sites

Blog Archive