This is a dedicated watch page for a single video.
Tony, a professional hacker, performed a vulnerability scan on a target organization by sniffing traffic on the network to identify the active systems, network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are accessing the network. What is the type of vulnerability assessment that Tony performed on the target organization?