![Kali Linux:An Ethical Hacker's Cookbook](https://wfqqreader-1252317822.image.myqcloud.com/cover/618/36700618/b_36700618.jpg)
上QQ阅读APP看书,第一时间看更新
Using scripts
The Nmap Scripting Engine (NSE) allows users to create their own scripts to perform different tasks automatically. These scripts are executed side by side when a scan is run. They can be used to perform more effective version detection, exploitation of the vulnerability, and so on. The command for using a script is:
nmap -Pn -sV host.com --script dns-brute
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/f1f9be51-5d1e-4f38-8e4f-8c3503ef4d39.png?sign=1739352024-fOaUwKGdDsVFgC1fnUIe3XXxZYYheKQ7-0-f64ab9460edf84e8833b3501051f4c29)
The output of the preceding command is as follows:
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/d1bb1b36-57bb-44bc-8829-a20af81df217.png?sign=1739352024-0iiuY6bqeUVEQwaRl5npPaBzZzNE7DQn-0-e29b47c9cb5a46fb4a3a9d85289dbb1e)
Here the script dns-brute tries to fetch the available subdomains by brute forcing it against a set of common subdomain names.