Penetration Testing with Python,” of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

Review the bruteLogin function on p. 58 of Ch. 2, “Penetration Testing with Python,” of Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.

You have been hired by a company to provide consultation on security and provide recommendations. Using Microsoft® Word, write a 1-page document explaining how the username and password are extracted from the password file. Describe what would happen if the script fails to open the password file. (Hint: Try / Except statements) 

Recommend and provide additional code that would better handle cases where the password file might not open.

find the cost of your paper