Summary
We have gone through the basic methods of fuzzing and password brute-forcing. Now we can extend the scripts to meet our own needs. There are many fuzzing and brute-force tools available, but a custom script will always be better to get our specific results. We will discuss more on debugging and reverse engineering with Python libraries in the next chapter.