Summary
We did a comprehensive overview of the top 21 types of automated attacks that are currently being used by attackers so that you can do an assessment of your organization to determine which of those attacks are a possible threat to your infrastructure and organization.
But we also learned that we can take advantage of automation, so we reviewed some Python libraries that you can leverage to perform automation in tasks related to forensics, web scraping, and network security.
And before closing the chapter, we learned how to take advantage of the famous Raspberry Pi to create some very cool cybersecurity gadgets that enable us to automate some tasks such as gathering malicious addresses to include in our blacklist and two different methods to test the speed and stability of an internet connection.
I hope this last part inspires you to do some extra testing and research to develop your own cybersecurity gadgets and prototypes like a master!