diff --git a/scripts/dns-nsec3-enum.nse b/scripts/dns-nsec3-enum.nse
index a0e4d2b83..03fbd97de 100644
--- a/scripts/dns-nsec3-enum.nse
+++ b/scripts/dns-nsec3-enum.nse
@@ -19,7 +19,7 @@ with salt and number of iterations used. This technique is known as
"NSEC3 walking".
That info should then be fed into an offline cracker, like
-unhash from http://dnscurve.org/nsec3walker.html, to
+unhash from https://dnscurve.org/nsec3walker.html, to
bruteforce the actual names from the hashes. Assuming that the script
output was written into a text file hashes.txt like:
@@ -46,7 +46,7 @@ Use the dns-nsec-enum script to handle servers that use NSEC
rather than NSEC3.
References:
-* http://dnscurve.org/nsec3walker.html
+* https://dnscurve.org/nsec3walker.html
]]
---
-- @usage