Summary
One of the objectives of this chapter was to analyze the modules that allow us to connect with FTP, SFTP, and SSH servers. In this chapter, we came across several network protocols and Python libraries that are used for interacting with remote systems. Finally, we reviewed some tools for auditing SSH server security. From a security point of view, by using the modules and tools we discussed in this chapter, you are now well equipped to check the security level of a server to minimize the exposure surface for a possible attacker.
In the next chapter, we will explore programming packages for working with the Nmap scanner and obtain more information about services and vulnerabilities that are running on servers.