<h3>Question Description</h3> <p><strong>Review</strong> the bruteLogin function on p. 58 of Ch. 2, "Penetration Testing with Python," of <em>Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers</em>.</p><p>You