Summary
In this chapter, we looked at the basics of packet-crafting and sniffing with some Python modules like pcapy-ng and scapy. During our security assessments, we may need the raw output and access to basic levels of packet topology so that we can analyze the information and make decisions ourselves. The most attractive part of scapy is that it can be imported and used to create networking tools without us having to create packets from scratch.
In the next chapter, we will explore programming packages in Python that help us extract public information from servers using Open Source Intelligence (OSINT) tools. We will also review tools to get information related to banners and DNS servers, and other tools to apply fuzzing processes with Python.