div class=ts-pagebutton class=gotoPage data-page=1Page 1button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page1jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=1 data-page=1 class=ts-thumb lazyload alt=Page 1: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails1jpg width=140 height=200 adivpChapter 1: Understanding the Penetration Testing Methodologypdivdiv class=ts-pagebutton class=gotoPage data-page=2Page 2button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page2jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=2 data-page=2 class=ts-thumb lazyload alt=Page 2: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails2jpg width=140 height=200 adivpChapter 2: The Basics of Python Scriptingpdivdiv class=ts-pagebutton class=gotoPage data-page=3Page 3button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page3jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=3 data-page=3 class=ts-thumb lazyload alt=Page 3: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails3jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=4Page 4button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page4jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=4 data-page=4 class=ts-thumb lazyload alt=Page 4: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails4jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=5Page 5button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page5jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=5 data-page=5 class=ts-thumb lazyload alt=Page 5: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails5jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=6Page 6button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page6jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=6 data-page=6 class=ts-thumb lazyload alt=Page 6: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails6jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=7Page 7button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page7jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=7 data-page=7 class=ts-thumb lazyload alt=Page 7: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails7jpg width=140 height=200 adivpChapter 3: Identifying Targets with Nmap Scapy and Pythonpdivdiv class=ts-pagebutton class=gotoPage data-page=8Page 8button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page8jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=8 data-page=8 class=ts-thumb lazyload alt=Page 8: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails8jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=9Page 9button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page9jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=9 data-page=9 class=ts-thumb lazyload alt=Page 9: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails9jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=10Page 10button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page10jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=10 data-page=10 class=ts-thumb lazyload alt=Page 10: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails10jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=11Page 11button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page11jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=11 data-page=11 class=ts-thumb lazyload alt=Page 11: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails11jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=12Page 12button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page12jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=12 data-page=12 class=ts-thumb lazyload alt=Page 12: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails12jpg width=140 height=200 adivpChapter 4: Executing Credential Attacks with Pythonpdivdiv class=ts-pagebutton class=gotoPage data-page=13Page 13button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page13jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=13 data-page=13 class=ts-thumb lazyload alt=Page 13: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails13jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=14Page 14button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page14jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=14 data-page=14 class=ts-thumb lazyload alt=Page 14: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails14jpg width=140 height=200 adivpChapter 5: Exploiting Services with Pythonpdivdiv class=ts-pagebutton class=gotoPage data-page=15Page 15button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page15jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=15 data-page=15 class=ts-thumb lazyload alt=Page 15: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails15jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=16Page 16button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page16jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=16 data-page=16 class=ts-thumb lazyload alt=Page 16: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails16jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=17Page 17button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page17jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=17 data-page=17 class=ts-thumb lazyload alt=Page 17: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails17jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=18Page 18button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page18jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=18 data-page=18 class=ts-thumb lazyload alt=Page 18: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails18jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=19Page 19button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page19jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=19 data-page=19 class=ts-thumb lazyload alt=Page 19: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails19jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=20Page 20button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page20jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=20 data-page=20 class=ts-thumb lazyload alt=Page 20: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails20jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=21Page 21button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page21jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=21 data-page=21 class=ts-thumb lazyload alt=Page 21: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails21jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=22Page 22button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page22jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=22 data-page=22 class=ts-thumb lazyload alt=Page 22: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails22jpg width=140 height=200 adivpChapter 6: Assessing Web Applications with Pythonpdivdiv class=ts-pagebutton class=gotoPage data-page=23Page 23button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page23jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=23 data-page=23 class=ts-thumb lazyload alt=Page 23: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails23jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=24Page 24button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page24jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=24 data-page=24 class=ts-thumb lazyload alt=Page 24: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails24jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=25Page 25button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page25jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=25 data-page=25 class=ts-thumb lazyload alt=Page 25: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails25jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=26Page 26button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page26jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=26 data-page=26 class=ts-thumb lazyload alt=Page 26: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails26jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=27Page 27button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page27jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=27 data-page=27 class=ts-thumb lazyload alt=Page 27: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails27jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=28Page 28button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page28jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=28 data-page=28 class=ts-thumb lazyload alt=Page 28: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails28jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=29Page 29button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page29jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=29 data-page=29 class=ts-thumb lazyload alt=Page 29: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails29jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=30Page 30button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page30jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=30 data-page=30 class=ts-thumb lazyload alt=Page 30: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails30jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=31Page 31button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page31jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=31 data-page=31 class=ts-thumb lazyload alt=Page 31: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails31jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=32Page 32button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page32jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=32 data-page=32 class=ts-thumb lazyload alt=Page 32: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails32jpg width=140 height=200 adivpChapter 7: Cracking the Perimeter with Pythonpdivdiv class=ts-pagebutton class=gotoPage data-page=33Page 33button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page33jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=33 data-page=33 class=ts-thumb lazyload alt=Page 33: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails33jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=34Page 34button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page34jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=34 data-page=34 class=ts-thumb lazyload alt=Page 34: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails34jpg width=140 height=200 adivpChapter 8: Exploit Development with Python Metasploit and Immunitypdivdiv class=ts-pagebutton class=gotoPage data-page=35Page 35button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page35jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=35 data-page=35 class=ts-thumb lazyload alt=Page 35: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails35jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=36Page 36button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page36jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=36 data-page=36 class=ts-thumb lazyload alt=Page 36: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails36jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=37Page 37button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page37jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=37 data-page=37 class=ts-thumb lazyload alt=Page 37: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails37jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=38Page 38button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page38jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=38 data-page=38 class=ts-thumb lazyload alt=Page 38: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails38jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=39Page 39button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page39jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=39 data-page=39 class=ts-thumb lazyload alt=Page 39: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails39jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=40Page 40button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page40jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=40 data-page=40 class=ts-thumb lazyload alt=Page 40: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails40jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=41Page 41button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page41jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=41 data-page=41 class=ts-thumb lazyload alt=Page 41: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails41jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=42Page 42button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page42jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=42 data-page=42 class=ts-thumb lazyload alt=Page 42: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails42jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=43Page 43button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page43jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=43 data-page=43 class=ts-thumb lazyload alt=Page 43: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails43jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=44Page 44button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page44jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=44 data-page=44 class=ts-thumb lazyload alt=Page 44: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails44jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=45Page 45button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page45jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=45 data-page=45 class=ts-thumb lazyload alt=Page 45: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails45jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=46Page 46button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page46jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=46 data-page=46 class=ts-thumb lazyload alt=Page 46: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails46jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=47Page 47button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page47jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=47 data-page=47 class=ts-thumb lazyload alt=Page 47: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails47jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=48Page 48button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page48jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=48 data-page=48 class=ts-thumb lazyload alt=Page 48: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails48jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=49Page 49button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page49jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=49 data-page=49 class=ts-thumb lazyload alt=Page 49: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails49jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=50Page 50button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page50jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=50 data-page=50 class=ts-thumb lazyload alt=Page 50: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails50jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=51Page 51button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page51jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=51 data-page=51 class=ts-thumb lazyload alt=Page 51: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails51jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=52Page 52button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page52jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=52 data-page=52 class=ts-thumb lazyload alt=Page 52: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails52jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=53Page 53button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page53jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=53 data-page=53 class=ts-thumb lazyload alt=Page 53: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails53jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=54Page 54button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page54jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=54 data-page=54 class=ts-thumb lazyload alt=Page 54: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails54jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=55Page 55button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page55jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=55 data-page=55 class=ts-thumb lazyload alt=Page 55: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails55jpg width=140 height=200 adivpChapter 9: Automating Reports and Tasks with Pythonpdivdiv class=ts-pagebutton class=gotoPage data-page=56Page 56button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page56jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=56 data-page=56 class=ts-thumb lazyload alt=Page 56: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails56jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=57Page 57button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page57jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=57 data-page=57 class=ts-thumb lazyload alt=Page 57: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails57jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=58Page 58button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page58jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=58 data-page=58 class=ts-thumb lazyload alt=Page 58: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails58jpg width=140 height=200 adivdivdiv class=ts-pagebutton class=gotoPage data-page=59Page 59button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page59jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=59 data-page=59 class=ts-thumb lazyload alt=Page 59: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails59jpg width=140 height=200 adivpChapter 10: Adding Permanency to Python Toolspdivdiv class=ts-pagebutton class=gotoPage data-page=60Page 60button div class=ts-imagea href=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5page60jpg target=_blank img data-url=chapter-1-understanding-the-penetration-testing-methodology-1-understanding-thehtmlpage=60 data-page=60 class=ts-thumb lazyload alt=Page 60: Chapter 1: Understanding the Penetration Testing Methodology · Chapter 1: Understanding the Penetration Testing Methodology Chapter 2: The Basics of Python Scripting test 4 loading=lazy src=data:imagegifbase64iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAQAAADYv8WvAAAAD0lEQVR42mP8X8AwAgiABKBAv+vAXklAAAAAElFTkSuQmCC data-src=https:reader042vdocumentssitereader042viewer20220215125af7904a7f8b9a927191d53chtml5thumbnails60jpg width=140 height=200 adivdiv