eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet192.168.153.128 netmask 255.255.255.0 broadcast 192.168.153.255
所以kali本机的ip:192.168.153.128
下一步扫C段,去确认存活主机。这里使用kali里自带的nmap,nmap命令
1
nmap -sP 192.168.153.1/24
结果如下
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-0207:19 EDT Nmap scan report for 192.168.153.1 Host is up (0.00071s latency). MAC Address: 00:50:56:C0:00:08 (VMware) Nmap scan report for 192.168.153.2 Host is up (0.00054s latency). MAC Address: 00:50:56:F3:BB:E5 (VMware) Nmap scan report for 192.168.153.134 Host is up (0.00017s latency). MAC Address: 00:0C:29:55:D6:61 (VMware) Nmap scan report for 192.168.153.254 Host is up (0.00038s latency). MAC Address: 00:50:56:FA:BD:7F (VMware) Nmap scan report for 192.168.153.128 Host is up. Nmap done: 256 IP addresses (5 hosts up) scanned in 2.06 seconds
Looks like you have got some secrets. Ok I just want todosome help to you. Dosome more fuzz on every page of php which was finded by you. Andif you getany right parameter then follow the below steps. If you still stuck Learn from here a basic tool with good usagefor OSCP. https://github.com/hacknpentest/Fuzzing/blob/master/Fuzz_For_Web //see the location.txt and you will get your next move// 翻译: 看起来你已经找到了一些秘密。 好的,我只是想给你一些帮助。 对你发现的每个 PHP 页面进行更多的模糊测试(fuzz)。如果你得到了正确的参数,请按照以下步骤操作。如果你仍然卡住了,可以从这里学习一个对 OSCP 很有用的基础工具: https://github.com/hacknpentest/Fuzzing/blob/master/Fuzz_For_Web // 查看 location.txt,你会得到下一步的行动指示 //
ok well Now you reah at the exact parameter Now dig some more for next one use 'secrettier360'parameteronsome other php page for more fun. 翻译: 好的,现在你已经找到了正确的参数。 接下来继续深入挖掘下一个参数吧。 在其他 PHP 页面上使用参数secrettier360,会有更多发现哦。