Bob, an attacker, has managed to access a target IoT device. He employed an online tool to gather information related to the model of the IoT device and the certifications granted to it.
Which of the following tools did Bob employ to gather the above information?
eli117
Highly Voted 1 year agoym6639
Most Recent 2 months, 1 week agoMann098
3 months, 3 weeks agoinsaniunt
4 months, 3 weeks agoVincent_Lu
10 months, 1 week agojeremy13
11 months, 3 weeks ago