Video upload date:  · Duration: PT1H46M27S  · Language: EN

Jeremy, an attacker, decided to find eccouncil video

ethical-hacker video for jeremy, an attacker, decided to find vulnerable IoT devices installed in the target organization. In this process, he used an online

This is a dedicated watch page for a single video.

Full Certification Question

Jeremy, an attacker, decided to find vulnerable IoT devices installed in the target organization. In this process, he used an online tool that helped him gather information such as a device’s manufacturer details, its IP address, and the location where it is installed. What is the online tool that Jeremy used in the above scenario?