Watch this video on YouTube
Danny, a black hat hacker, uses an online tool to gather information such as network topology, network range and operating system used in the target’s network. Which of the following online services will serve the objective of Danny.