Summary

In this chapter, we learned about developing custom exploits that are able to avoid antivirus software. We have also studied how to develop a custom Linux-based key logger that sends keystrokes across the network to the remote attacker. We also explored various concepts to do with parsing Nessus and Nmap reports. We came to understand how to extract browser passwords with Python utilities and how to go about parsing Twitter feeds.

This chapter marks the conclusion of this book. I would recommend you explore more about Python and apply it more often in offensive security. A good place to start would be to take all the examples, use cases, and exploits discussed in this book and to make them as general as possible.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset