Summary
We have discussed the basic possibilities of attack scripting. Now you can create custom scripts according to your needs. In this chapter we have used mechanize for the scripting. We can also use any other modules we have discussed in the previous chapters to achieve the requirements. We will discuss more on fuzzing and brute-forcing attacks in the next chapter.