In this chapter, we learned about DDNS and the DDNS-aware shell. We also learned how to interact with Twitter, and replicate Metasploit's screen capturing, and we searched for the content and looked into target directory navigation. Last, we saw how to integrate a low-level port scanner.
In the next chapter, we will learn about password hacking.