This is a dedicated watch page for a single video.
Larry, a professional hacker, targeted the IoT cameras and devices used by a target venture-capital firm. He used an infomation-gathering tool to collect information about the IoT devices connected to a network, open port and services, and the attack surface area. Using this tool, he also generated statistical reports on broad usage patterns and trends. This tool helped Larry continually monitor every reachable server and device on the internet, further allowing him to exploit these devices in the network. Which of the following tools was employed by Larry in the above scenario?