يتذكر فهداً رآه على شاشة التلفزيون،
فهدا قويا يحاصر ظبيا رضيعا
وحين دنا منه شم الحليب
فلم يفترسه

كأن الحليب يروض وحش الفلاة
م.د
"حنى الوحوش ترفض أن تفعل مثلكم وتؤذي الطفولة أيها المجرمون"

28‏/08‏/2020

CEH Practical: Gathering Target Information: Reconnaissance And Competitive Intelligence

CEH Exam Objectives:

Describe Reconnaissance. 

Describe aggressive/competitive intelligence.


Reconnaissance

 Reconnaissance is the process of gathering informative data about a particular target of a malicious hack by exploring the targeted system. Basically two types of Reconnaissance exist i.e. Active and Passive. Active reconnaissance typically related to port scanning and observing the vulnerabilities about the targeted system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers). Passive reconnaissance typically you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.

Understand Aggressive Intelligence 

Competitive intelligence means information gathering about competitors' products, marketing, and technologies. Most competitive intelligence is non intrusive to the company being investigated and is benign in nature. It's used for product comparison or as a sales and marketing tactic to better understand how competitors are positioning their products or services.

Online tools to gather competitive intelligence

Exercise 1.1

Using KeywordSpy 

To use the KeywordSpy online tool to gather competitive intelligence information:  
  • Go to the www.keywordspy.com website and enter the website address of the target in the search field 

  • Review the report and determine valuable keywords, links, or other information.

 

Exercise 1.2

Using spyfu

  • Go to your browser and type www.spyfu.com and enter the website address of the target in the search field.

Exercise 1.3

Using the EDGAR Database to Gather Information

1. Determine the company's stock symbol using Google.

2. Open a web browser to www.sec.gov.


3. On the right side of the page, click the link EDGAR Filers. 


4. Click the Search For Filings menu and enter the company name or stock  symbol to search the filings for information. You can learn, for example, where the company is registered and who reported the filing.

5. Use the Yahoo! yellow pages ( http://yp.yahoo.com ) to see if an address or phone number is listed for any of the employee names you have located.

Related news


  1. Github Hacking Tools
  2. Hack Tool Apk
  3. Pentest Tools For Windows
  4. Best Hacking Tools 2019
  5. Hacker Tools Online
  6. Hackrf Tools
  7. Hack Tools For Pc
  8. Hacking Tools Usb
  9. Pentest Tools Online
  10. Hacker Tools Online
  11. Pentest Tools Bluekeep
  12. Pentest Tools Find Subdomains
  13. Github Hacking Tools
  14. Pentest Tools Free
  15. Hacker Hardware Tools
  16. Pentest Tools Download
  17. Game Hacking
  18. How To Install Pentest Tools In Ubuntu
  19. Hacker Tools
  20. Hacker Tools For Pc
  21. What Is Hacking Tools
  22. Hacking Tools Online
  23. Hack App
  24. Hacking Tools For Beginners
  25. World No 1 Hacker Software
  26. Hack Tools For Windows
  27. How To Hack
  28. Hacking Apps
  29. Pentest Tools Download
  30. Hacking Tools 2019
  31. Nsa Hacker Tools
  32. Hacker Tools Apk Download
  33. Pentest Tools Download
  34. Pentest Tools Nmap
  35. Hack And Tools
  36. Tools For Hacker
  37. Pentest Tools Free
  38. Hacker Tools Mac
  39. Pentest Tools For Android
  40. Hack App
  41. Hacking Tools 2019
  42. Hacking Tools Mac
  43. Android Hack Tools Github
  44. Hacking Tools For Mac
  45. How To Make Hacking Tools
  46. Bluetooth Hacking Tools Kali
  47. Termux Hacking Tools 2019
  48. Pentest Tools Download
  49. Hacker Tools List
  50. Hacking Tools Kit
  51. Hack Rom Tools

ليست هناك تعليقات: