With a little bit of rigor, a spark of curiosity, and determination while following along in this section, we have certainly grasped the power of Perl's beautiful ability to match patterns using regular expressions and applied it to open source intelligence gathering and vulnerability analysis. Once again, the best penetration tester is the one who can utilize imagination with a good understanding of how the underlying technologies work to find even the smallest hole to exploit. Information gathering can really prove helpful in finding out vulnerabilities.
In the next chapter, we will use Perl to crack passwords and hashes obtained throughout the journey of this book and its examples.
No credit card required