John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?
Cherubael
2Â months, 1Â week agojonekool
2Â months, 2Â weeks agojonekool
2Â months, 3Â weeks agoPoornima023
3Â months, 1Â week agogetaseadsss
4Â months agoLeonardoLira
4Â months agokillwitch
4Â months agoBooict
4Â months, 1Â week agoRangnarok
5Â months, 2Â weeks ago