![Kali Linux:An Ethical Hacker's Cookbook](https://wfqqreader-1252317822.image.myqcloud.com/cover/618/36700618/b_36700618.jpg)
上QQ阅读APP看书,第一时间看更新
Using scripts
The Nmap Scripting Engine (NSE) allows users to create their own scripts to perform different tasks automatically. These scripts are executed side by side when a scan is run. They can be used to perform more effective version detection, exploitation of the vulnerability, and so on. The command for using a script is:
nmap -Pn -sV host.com --script dns-brute
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/f1f9be51-5d1e-4f38-8e4f-8c3503ef4d39.png?sign=1739289403-hWEzJHPklr4sWNLiPf6CijQIPTf8Lo1f-0-d9154f213825e8a231b1f280c6107a05)
The output of the preceding command is as follows:
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/d1bb1b36-57bb-44bc-8829-a20af81df217.png?sign=1739289403-JfEPJduzcGyBo7rVb9rG9U9MeHzAqr6M-0-696a95e9ad94f489614d8ab9fced1ed0)
Here the script dns-brute tries to fetch the available subdomains by brute forcing it against a set of common subdomain names.