John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?
jeremy13
Highly Voted 2 years, 1 month agoeli117
Highly Voted 2 years, 2 months agobest2000
2 years, 1 month agoRobertVidal
Most Recent 4 months, 1 week agoMann098
5 months, 1 week agoametah
11 months, 3 weeks agozarrrzz
12 months agozarrrzz
12 months agoLost_Memo
1 year agodesertlotus1211
1 year, 1 month agodesertlotus1211
1 year, 1 month agojettguo
1 year, 2 months agosh4dali
1 year, 3 months agobarey
1 year, 3 months agoyasso2023
1 year, 4 months agoyasso2023
1 year, 4 months agoHetBeest
1 year, 5 months ago4MM449
1 year, 5 months agoinsaniunt
1 year, 6 months ago