Summary

We have gone through the basic methods of fuzzing and password brute-forcing. Now we can extend the scripts to meet our own needs. There are many fuzzing and brute-force tools available, but a custom script will always be better to get our specific results. We will discuss more on debugging and reverse engineering with Python libraries in the next chapter.

Get Effective Python Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.