diff --git a/scripts/dns-nsec3-enum.nse b/scripts/dns-nsec3-enum.nse index a0e4d2b83..03fbd97de 100644 --- a/scripts/dns-nsec3-enum.nse +++ b/scripts/dns-nsec3-enum.nse @@ -19,7 +19,7 @@ with salt and number of iterations used. This technique is known as "NSEC3 walking". That info should then be fed into an offline cracker, like -unhash from http://dnscurve.org/nsec3walker.html, to +unhash from https://dnscurve.org/nsec3walker.html, to bruteforce the actual names from the hashes. Assuming that the script output was written into a text file hashes.txt like: @@ -46,7 +46,7 @@ Use the dns-nsec-enum script to handle servers that use NSEC rather than NSEC3. References: -* http://dnscurve.org/nsec3walker.html +* https://dnscurve.org/nsec3walker.html ]] --- -- @usage