![Kali Linux:An Ethical Hacker's Cookbook](https://wfqqreader-1252317822.image.myqcloud.com/cover/618/36700618/b_36700618.jpg)
上QQ阅读APP看书,第一时间看更新
Using scripts
The Nmap Scripting Engine (NSE) allows users to create their own scripts to perform different tasks automatically. These scripts are executed side by side when a scan is run. They can be used to perform more effective version detection, exploitation of the vulnerability, and so on. The command for using a script is:
nmap -Pn -sV host.com --script dns-brute
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/f1f9be51-5d1e-4f38-8e4f-8c3503ef4d39.png?sign=1739247410-cp20SOhtbkjexhljN7qz923o9nuauNjD-0-a3a49460f09e6c901a98c9439999151f)
The output of the preceding command is as follows:
![](https://epubservercos.yuewen.com/364BC0/19470402501612306/epubprivate/OEBPS/Images/d1bb1b36-57bb-44bc-8829-a20af81df217.png?sign=1739247410-NqFvBv52RPVFGbSwHxYlNCNl1hxwC57L-0-3ca11c19846c2199dbd9e2d8c07b5f0d)
Here the script dns-brute tries to fetch the available subdomains by brute forcing it against a set of common subdomain names.