As per my last article(Part 1), ( Part 2), (part-3) we had a look at basic architecture and penetration testing tools and…