gobysec / Goby

Attack surface mapping
https://gobies.org/
1.39k stars 151 forks source link

发生未知错误 #345

Open hacky0u opened 2 years ago

hacky0u commented 2 years ago

2022/09/09 10:30:35 read user rule file ok: 0 2022/09/09 10:30:35 Version: v2.0.312+alpha 2022/09/09 10:30:37 API Server listen at 127.0.0.1:8361 2022/09/09 10:30:37 127.0.0.1:52791 GET /api/v1/live
2022/09/09 10:30:46 127.0.0.1:52816 POST /api/v1/setEnvi
2022/09/09 10:30:47 127.0.0.1:52822 GET /api/v1/getEnvi?
2022/09/09 10:30:47 127.0.0.1:52823 POST /api/v1/getTasks
2022/09/09 10:30:47 [DEBUG] get adapter of device \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] devices: [{\Device\NPF{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} Microsoft Wi-Fi Direct Virtual Adapter 46 []} {\Device\NPF{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} WAN Miniport (IPv6) 22 []} {\Device\NPF{137C40A9-4B0D-4ED0-9B07-BE406534F852} WAN Miniport (IP) 22 []} {\Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} Qualcomm QCA9377 802.11ac Wireless Adapter 30 [{fe80::797a:99e4:e0e:1e4e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.0.120 ffffff00 192.168.0.255 }]} {\Device\NPF{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::8d03:1d67:7230:d203 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.30.1 ffffff00 192.168.30.255 }]} {\Device\NPF{2046A9AE-CE67-44CE-987F-9F0F0E23C923} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::e8d2:790c:2b6a:14a4 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.229.1 ffffff00 192.168.229.255 }]} {\Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} Realtek PCIe FE Family Controller 22 [{fe80::2c62:16c1:e130:c8ca ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.66.140 ffffff00 192.168.66.255 }]} {\Device\NPF{12E1F14C-0919-44D1-8E83-F9B89B1364F2} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::205f:c55d:3175:ecc9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.236.201 ffff0000 169.254.255.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []} {\Device\NPF{D70EDB20-8EF4-45AF-9344-DEF8D6022136} Corechip SR9900 USB2.0 to Fast Ethernet Adapter 38 [{fe80::6dc3:35db:bd02:da6c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.218.108 ffff0000 169.254.255.255 }]} {\Device\NPF{5C9468CF-BC47-4441-9BB9-3FE5DAD82E87} TAP-Windows Adapter V9 38 [{fe80::ddd3:8c38:a82:d44d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.212.77 ffff0000 169.254.255.255 }]} {\Device\NPF{A661060A-B59E-4D33-B8AF-925D937A2838} SSL VPN Client Virtual Network Adapter 38 [{fe80::4519:6e02:313f:4004 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.64.4 ffff0000 169.254.255.255 }]}] 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} != \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} != \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} != \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF{137C40A9-4B0D-4ED0-9B07-BE406534F852} != \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} != \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} != \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF{2046A9AE-CE67-44CE-987F-9F0F0E23C923} != \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] getGatewayMac: \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 0.0.0.0 2022/09/09 10:30:49 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired 2022/09/09 10:30:50 [DEBUG] fetch mac address timeout: \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:50 ReadPacketData error: EOF 2022/09/09 10:30:50 [DEBUG] close pcap handler for getGatewayMac 2022/09/09 10:30:50 [DEBUG] fetch gateway mac failed: \Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:51 127.0.0.1:52827 GET /api/v1/getEnvi?field=licenseInfo
2022/09/09 10:30:52 127.0.0.1:52830 POST /api/v1/getStatisticsData
2022/09/09 10:30:54 127.0.0.1:52831 POST /api/v1/resumeScan
2022/09/09 10:30:54 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.0.0/24 2022/09/09 10:30:54 start port scanner: totalSize: 23296, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1662690363711526000, ScanOffset: 23296, ScanICMP: false, CheckAliveMode: 0 2022/09/09 10:30:54 pcap version: Npcap version 1.55, based on libpcap version 1.10.2-PRE-GIT 2022/09/09 10:30:54 127.0.0.1:52832 POST /api/v1/getProgress
2022/09/09 10:30:55 found device from route table for 192.168.0.0: \Device\NPF
{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] get adapter of device \Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] devices: [{\Device\NPF{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} Microsoft Wi-Fi Direct Virtual Adapter 46 []} {\Device\NPF{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} WAN Miniport (IPv6) 22 []} {\Device\NPF{137C40A9-4B0D-4ED0-9B07-BE406534F852} WAN Miniport (IP) 22 []} {\Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} Qualcomm QCA9377 802.11ac Wireless Adapter 30 [{fe80::797a:99e4:e0e:1e4e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.0.120 ffffff00 192.168.0.255 }]} {\Device\NPF{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::8d03:1d67:7230:d203 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.30.1 ffffff00 192.168.30.255 }]} {\Device\NPF{2046A9AE-CE67-44CE-987F-9F0F0E23C923} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::e8d2:790c:2b6a:14a4 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.229.1 ffffff00 192.168.229.255 }]} {\Device\NPF{A158946B-F5C2-48A4-B352-494226B55F27} Realtek PCIe FE Family Controller 22 [{fe80::2c62:16c1:e130:c8ca ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.66.140 ffffff00 192.168.66.255 }]} {\Device\NPF{12E1F14C-0919-44D1-8E83-F9B89B1364F2} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::205f:c55d:3175:ecc9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.236.201 ffff0000 169.254.255.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []} {\Device\NPF{D70EDB20-8EF4-45AF-9344-DEF8D6022136} Corechip SR9900 USB2.0 to Fast Ethernet Adapter 38 [{fe80::6dc3:35db:bd02:da6c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.218.108 ffff0000 169.254.255.255 }]} {\Device\NPF{5C9468CF-BC47-4441-9BB9-3FE5DAD82E87} TAP-Windows Adapter V9 38 [{fe80::ddd3:8c38:a82:d44d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.212.77 ffff0000 169.254.255.255 }]} {\Device\NPF{A661060A-B59E-4D33-B8AF-925D937A2838} SSL VPN Client Virtual Network Adapter 38 [{fe80::4519:6e02:313f:4004 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.64.4 ffff0000 169.254.255.255 }]}] 2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} != \Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} != \Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} != \Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF{137C40A9-4B0D-4ED0-9B07-BE406534F852} != \Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] getGatewayMac: \Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} 192.168.0.0 2022/09/09 10:30:56 find router mac is 80:ea:07:a1:33:39 2022/09/09 10:30:57 [DEBUG] fetch mac address: \Device\NPF{D5966847-9D07-44D2-8B90-51502FE31271} 80:ea:07:a1:33:39 2022/09/09 10:30:57 [DEBUG] close pcap handler for getGatewayMac 2022/09/09 10:30:57 select adapter of to send packets: &{\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 192.168.0.120 [fe80::797a:99e4:e0e:1e4e] {192.168.0.120 ffffff00} ffffff00 18:47:3d:de:48:1d Qualcomm QCA9377 802.11ac Wireless Adapter 80:ea:07:a1:33:39} 2022/09/09 10:30:57 routine-recv start 2022/09/09 10:30:57 start first round ARP 2022/09/09 10:30:57 127.0.0.1:52834 POST /api/v1/getProgress
2022/09/09 10:30:57 port scanner is ready 2022/09/09 10:30:57 routine-target is about to exit since target pool is running out 2022/09/09 10:30:57 routine-target is exit since target pool and retry pool is running out 2022/09/09 10:30:57 127.0.0.1:52836 POST /api/v1/getStatisticsData
2022/09/09 10:30:58 found ip-mac: 192.168.0.130 - 18:c0:4d:6b:f9:f1 2022/09/09 10:30:58 GrabScannerStatistics: {0 0 0 1} 2022/09/09 10:30:58 AppScannerStatistics: {0 0 0 1} 2022/09/09 10:30:58 SendPacketCount: 23296 23296 2022/09/09 10:30:58 4.102s 23296/23296 (100.00% N/A left); send: 205 49.97 pkt/s (49.98 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2022/09/09 10:30:58 routine-status is exit since scan is done 2022/09/09 10:30:59 found ip-mac: 192.168.0.126 - 18:c0:4d:a4:a8:57 2022/09/09 10:30:59 found ip-mac: 192.168.0.101 - fe:8c:21:0e:71:f7 2022/09/09 10:30:59 found ip-mac: 192.168.0.106 - ca:0b:1b:c0:41:ec 2022/09/09 10:30:59 found ip-mac: 192.168.0.107 - 90:c5:4a:cd:8a:f5 2022/09/09 10:30:59 first round ARP done 2022/09/09 10:31:00 found ip-mac: 192.168.0.1 - 80:ea:07:a1:33:39 2022/09/09 10:31:00 start sending packets 2022/09/09 10:31:00 routine-send out 2022/09/09 10:31:00 127.0.0.1:52839 POST /api/v1/getStatisticsData
2022/09/09 10:31:00 127.0.0.1:52838 POST /api/v1/getProgress
2022/09/09 10:31:04 127.0.0.1:52845 POST /api/v1/getProgress
2022/09/09 10:31:04 127.0.0.1:52846 POST /api/v1/getStatisticsData
2022/09/09 10:31:04 BasicNetworkInfoScanner out... 2022/09/09 10:31:05 start another round ARP 2022/09/09 10:31:05 found ip-mac: 192.168.0.130 - 18:c0:4d:6b:f9:f1 2022/09/09 10:31:05 found ip-mac: 192.168.0.126 - 18:c0:4d:a4:a8:57 2022/09/09 10:31:06 found ip-mac: 192.168.0.128 - fe:8c:21:0e:71:f7 2022/09/09 10:31:06 found ip-mac: 192.168.0.101 - fe:8c:21:0e:71:f7 2022/09/09 10:31:06 found ip-mac: 192.168.0.102 - c2:4c:28:d3:08:68 2022/09/09 10:31:06 another round ARP done 2022/09/09 10:31:07 found ip-mac: 192.168.0.1 - 80:ea:07:a1:33:39 2022/09/09 10:31:08 127.0.0.1:52855 POST /api/v1/getProgress
2022/09/09 10:31:08 127.0.0.1:52856 POST /api/v1/getStatisticsData
2022/09/09 10:31:10 close pcap sender 2022/09/09 10:31:10 routine-recv out 2022/09/09 10:31:11 routine-pcap-sender is exit 2022/09/09 10:31:11 done: 16.434s 23296/23296 (100.00%) send: 512; recv: 3 2022/09/09 10:31:11 PortScanner out... 2022/09/09 10:31:12 127.0.0.1:52859 POST /api/v1/getProgress
2022/09/09 10:31:12 127.0.0.1:52860 POST /api/v1/getStatisticsData
2022/09/09 10:31:14 GrabScanner out... 2022/09/09 10:31:14 AppScanner out... 2022/09/09 10:31:14 GrabScannerStatistics: {0 0 0 0} 2022/09/09 10:31:14 AppScannerStatistics: {0 0 0 0} 2022/09/09 10:31:14 finished all information, now try to find vulnerabilities... 2022/09/09 10:31:14 [WARNING] LoadJsonFile error: open F:\goby-win-x64-1.9.325\goby-win-x64-1.9.325\golib\exploits\user\Spring_Framework_Data_Binding_Rules_Spring4Shell_RCE_CVE_2022_22965.json: Access is denied. 2022/09/09 10:31:14 [INFO] broadcast: error no name in vul: Spring_Framework_Data_Binding_Rules_Spring4Shell_RCE_CVE_2022_22965.json

2022/09/09 10:31:16 127.0.0.1:52862 POST /api/v1/getProgress
2022/09/09 10:31:16 127.0.0.1:52863 POST /api/v1/getStatisticsData

gobysec commented 11 months ago

未看到完整错误日志,请联系微信:gobyteam。为您尽快解决,感谢您的反馈与支持。

hacky0u commented 11 months ago

这是来自QQ邮箱的假期自动回复邮件。你好,我最近正在休假中,无法亲自回复你的邮件。我将在假期结束后,尽快给你回复。