
上QQ阅读APP看书,第一时间看更新
Using scripts
The Nmap Scripting Engine (NSE) allows users to create their own scripts to perform different tasks automatically. These scripts are executed side by side when a scan is run. They can be used to perform more effective version detection, exploitation of the vulnerability, and so on. The command for using a script is:
nmap -Pn -sV host.com --script dns-brute

The output of the preceding command is as follows:

Here the script dns-brute tries to fetch the available subdomains by brute forcing it against a set of common subdomain names.