John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?
Cherubael
4Â days, 11Â hours agomulekule
1Â week, 1Â day agojonekool
1Â week, 3Â days agojonekool
2Â weeks, 4Â days agoPoornima023
1Â month agogetaseadsss
2Â months agoLeonardoLira
2Â months agokillwitch
2Â months agoBooict
2Â months agoRangnarok
3Â months, 2Â weeks ago