John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?
jeremy13
Highly Voted 2 years agoeli117
Highly Voted 2 years agobest2000
1 year, 11 months agoRobertVidal
Most Recent 2 months, 3 weeks agoMann098
3 months, 3 weeks agoametah
10 months agozarrrzz
10 months, 1 week agozarrrzz
10 months, 1 week agoLost_Memo
11 months, 2 weeks agodesertlotus1211
1 year agodesertlotus1211
1 year agojettguo
1 year, 1 month agosh4dali
1 year, 1 month agobarey
1 year, 2 months agoyasso2023
1 year, 3 months agoyasso2023
1 year, 3 months agoHetBeest
1 year, 4 months ago4MM449
1 year, 4 months agoinsaniunt
1 year, 4 months ago