Summary
In this chapter, we learned about the different modules that allow us to extract information that servers expose publicly. We began by discussing the main OSINT tools used to extract information from servers and looked at details of specific tools like SpiderFoot. This was followed by the dnspython module, which we used to extract DNS records from a specific domain. Finally, we learned about the fuzzing process and used the FuzzDB project to test vulnerabilities in servers.
The tools we have discussed, and the information you extracted from servers, will be useful for later phases of our pentesting or audit process.
In the next chapter, we will explore the Python programming packages that interact with the FTP, SSH, and SNMP servers.