Summary
In this chapter, the objective was to provide specific search engines to obtain more information about a vulnerability. We have analyzed the main databases for searching CVE identifiers, as well as how we could automate the extraction process using Python.
In the next chapter, we will introduce the main modules we have in Python for extracting information about geolocation IP addresses; extract metadata from images and PDF documents; and identify the web technology used by a website. Also, we will cover how to extract metadata for Chrome and Firefox browsers and information related to downloads, cookies, and history data stored in the SQLite database.