John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?
jeremy13
Highly Voted 1 year agoeli117
Highly Voted 1 year agobest2000
12 months agodesertlotus1211
Most Recent 2 weeks, 5 days agodesertlotus1211
2 weeks, 5 days agojettguo
1 month, 1 week agosh4dali
1 month, 3 weeks agobarey
2 months, 2 weeks agoyasso2023
3 months, 2 weeks agoyasso2023
3 months, 2 weeks agoHetBeest
4 months, 2 weeks ago4MM449
4 months, 2 weeks agoinsaniunt
5 months agoAA_Ron
5 months, 1 week agodavitm
6 months agosringan
6 months, 3 weeks agosolaWONDER
7 months agosausageman
1 year ago