This is a dedicated watch page for a single video.
The attacker, as part of the attack, installed a scanning tool on a device owned by an employee of the target organization. Using this tool, they scanned multiple devices on the same network to uncover vulnerabilities for further exploitation. Which type of vulnerability assessment tool did the attacker use?