John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?
Ryan2019
Highly Voted 2 years, 11 months agoHaythem026
Highly Voted 2 years, 8 months agoMH2
Most Recent 7 months, 3 weeks agovictorfs
1 year agoDaniel8660
1 year, 6 months agoBlueteam
1 year, 8 months agoBIOLorenz
1 year, 9 months agoStormCloak4Ever
1 year, 10 months agoJong1
2 years, 1 month agoTheDark
2 years, 4 months agoNassman
2 years, 5 months agoANDRESCB1988
2 years, 9 months agoUchiha_Itachi8
2 years, 9 months agoKamal_SriLanka
2 years, 9 months agoUchiha_Itachi8
2 years, 9 months agoSuksitt
2 years, 11 months agoNassman
2 years, 5 months ago