A number of scripts belong to the default category. Then these scripts are grouped under various categories including those for authentication ( auth), discovering of hosts ( broadcast), brute force attacks to guess authentication credentials ( brute), discovering more about a network ( discovery), causing a denial of service ( dos), exploiting some vulnerability ( exploit), etc. Postrule scripts – are scripts run after Nmap has scanned all of its target hosts.Service scripts – are scripts run against specific services listening on a target host.Host scripts – are scripts executed after Nmap has performed normal operations such as host discovery, port scanning, version detection, and OS detection against a target host.Prerule scripts – are scripts that run before any of Nmap’s scan operations, they are executed when Nmap hasn’t gathered any information about a target yet.There are four types of NSE scripts, namely: Read Also: 29 Practical Examples of Nmap Commands for Linux It enables you to write your own scripts in Lua programming language, and possibly share these scripts with other Nmap users out there. One of the interesting features of Nmap is the Nmap Script Engine ( NSE), which brings even more flexibility and efficiency to it. It can also help you get an overview of systems that connected your network you can use it to find out all IP addresses of live hosts, scan open ports and services running on those hosts, and so much more.
![zenmap target zenmap target](https://static.javatpoint.com/tutorial/ethical-hacking/images/zenmap5.png)
Nmap is a popular, powerful and cross-platform command-line network security scanner and exploration tool.