John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker installed a scanner on a machine belonging to one of the victims and scanned several machines on the same network to identify vulnerabilities to perform further exploitation.
What is the type of vulnerability assessment tool employed by John in the above scenario?
jeremy13
Highly Voted 1 year, 7 months agoeli117
Highly Voted 1 year, 7 months agobest2000
1 year, 6 months agoametah
Most Recent 5 months, 1 week agozarrrzz
5 months, 2 weeks agozarrrzz
5 months, 2 weeks agoLost_Memo
6 months, 2 weeks agodesertlotus1211
7 months, 2 weeks agodesertlotus1211
7 months, 2 weeks agojettguo
8 months, 1 week agosh4dali
8 months, 3 weeks agobarey
9 months, 2 weeks agoyasso2023
10 months, 2 weeks agoyasso2023
10 months, 2 weeks agoHetBeest
11 months, 2 weeks ago4MM449
11 months, 2 weeks agoinsaniunt
1 year agoAA_Ron
1 year agodavitm
1 year ago