This is a dedicated watch page for a single video.
Daniel, a skilled hacker, set his sights on CyberNet Corp., a multinational corporation. He opted to identify the IoT devices connected within the target network utilizing default credentials, susceptible to various hijacking attacks. To achieve this, he employed an automated tool to conduct a thorough scan of the target network, focusing on specific types of IoT devices. The objective was to ascertain if these devices were utilizing the default, factory-set credentials. What is the tool utilized by Daniel in the above scenario?