![Kali Linux:An Ethical Hacker's Cookbook(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/772/36698772/b_36698772.jpg)
上QQ阅读APP看书,第一时间看更新
Using scripts
NSE, or the Nmap scripting engine, allows users to create their own scripts to perform different tasks automatically. These scripts are executed side by side when a scan is run. They can be used to perform more effective version detection, view the exploitation of a vulnerability, and so on.
The command for using a script is as follows:
nmap -sV host.com -script dns-brute
This command can be seen in the following screenshot:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/b7ba5240-6eb0-4386-970b-c908591d6cc5.png?sign=1738838165-oA7QkFmOkIk6CAiZdnUnkrdTL9C8lLzR-0-355ae46269eb869438651f797fae1e0c)
The following screenshot shows the output for the preceding command:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/a3b5a554-703c-4aa8-9795-aabf47ddcb12.png?sign=1738838165-s3KrDx9rzjGZs3f7j800VEqcJfSyRd7w-0-eba5c29cdbd27e0dbbb556edf5f6e8a0)
Here, the dns-brute script tries to fetch the available subdomains by brute forcing it against a set of common subdomain names.