ethical-hacker video for ken, a black hacker, wants to get information about IoT cameras and devices used by the attacked company. For these purposes, he will
Ken, a black hacker, wants to get information about IoT cameras and devices used by the attacked company. For these purposes, he will use a tool that collects information about the IoT devices connected to a network, open ports and services, and the attack surface area. Thanks to this tool, Ken constantly monitors every available server and device on the internet. This opportunity will allow him to exploit these devices in the future. Which of the following tools did Ken use to carry out this attack?