![Kali Linux:An Ethical Hacker's Cookbook](https://wfqqreader-1252317822.image.myqcloud.com/cover/618/36700618/b_36700618.jpg)
上QQ阅读APP看书,第一时间看更新
Using scripts
The Nmap Scripting Engine (NSE) allows users to create their own scripts to perform different tasks automatically. These scripts are executed side by side when a scan is run. They can be used to perform more effective version detection, exploitation of the vulnerability, and so on. The command for using a script is:
nmap -Pn -sV host.com --script dns-brute
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/f1f9be51-5d1e-4f38-8e4f-8c3503ef4d39.png?sign=1739186465-jp9YYNlpKt5BjrBb2IpFtWC1digkd892-0-b994ed429c4444ca655ca3042b420a43)
The output of the preceding command is as follows:
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/d1bb1b36-57bb-44bc-8829-a20af81df217.png?sign=1739186465-dzwgHuE3A5Sm6hK3MGWLY868bmw06SkQ-0-4cfc6d143fe6c3c415569ca0b129851f)
Here the script dns-brute tries to fetch the available subdomains by brute forcing it against a set of common subdomain names.