Bob, an attacker, has managed to access a target IoT device. He employed an online tool to gather information related to the model of the IoT device and the certifications granted to it.
Which of the following tools did Bob employ to gather the above information?
blacksheep6r
Highly Voted 2 years, 9 months agoDaniel8660
Highly Voted 1 year, 9 months agoJohanLondon
Most Recent 11 months, 4 weeks agoGrey975
1 year, 12 months agoANDRESCB1988
2 years, 12 months ago