Summary
In this chapter, we learned about the different modules that allow us to extract information that servers expose publicly. We began by discussing the Shodan service and used it to extract information from servers. We then used the socket
module to obtain server information. This was followed by the DNSPython
module, which we used to extract DNS records from a specific domain. Finally, we learned about the fuzzing process and used the FuzzDB project to test vulnerabilities in servers.
The tools we have discussed, and the information you extracted from servers, can be useful for later phases of our pentesting or audit process.
In the next chapter, we will explore the Python programming packages that interact with the FTP, SSH, and SNMP servers.