gobysec / Goby

Attack surface mapping
https://gobies.org/
1.36k stars 149 forks source link

Error details: Error 2023/07/22 15:38:46 [DEBUG] runtime.NumCPU():16, runtime.GOMAXPROCS():14 2023/07/22 15:38:46 read user rule file ok: 0 #440

Open qwe1433223 opened 11 months ago

qwe1433223 commented 11 months ago

2023/07/22 15:38:46 [DEBUG] runtime.NumCPU():16, runtime.GOMAXPROCS():14 2023/07/22 15:38:46 read user rule file ok: 0 2023/07/22 15:38:46 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/07/22 15:38:46 init repleace log regex len: 3 2023/07/22 15:38:46 Grab version: grab_version1.9.1.0 2023/07/22 15:38:46 Support 343 protocols, 803 ports 2023/07/22 15:38:46 Version: v2.6.0 2023/07/22 15:38:48 pcap version: Npcap version 1.75, based on libpcap version 1.10.4 2023/07/22 15:38:48 found device from route table for 8.8.8.8: \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:48 [DEBUG] get adapter of device \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:48 [DEBUG] devices: [{\Device\NPF{304D87B7-ABAF-41E2-A815-FBC2E9597303} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{76813B85-26CC-43E9-84A0-7ADA9F70CA99} WAN Miniport (IPv6) 22 []} {\Device\NPF{9AC172F8-4ABB-4EB5-AE3E-2EA348470323} WAN Miniport (IP) 22 []} {\Device\NPF{472E65A2-901D-42D9-8756-6E8E6F1CBAA5} VMware Virtual Ethernet Adapter for VMnet8 22 [{192.168.253.1 ffffff00 192.168.253.255 } {fe80::5beb:6c82:7aed:b191 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{B092443D-E685-463B-98C6-A45ECC2981BF} VMware Virtual Ethernet Adapter for VMnet1 22 [{192.168.248.1 ffffff00 192.168.248.255 } {fe80::c126:e239:62a7:99df ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} Realtek PCIe GbE Family Controller 22 [{192.168.0.2 ffffff00 192.168.0.255 } {fe80::3ded:26fd:2ad2:7f4b ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]}] 2023/07/22 15:38:48 [DEBUG] device name is not match: \Device\NPF{304D87B7-ABAF-41E2-A815-FBC2E9597303} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:48 [DEBUG] device name is not match: \Device\NPF{76813B85-26CC-43E9-84A0-7ADA9F70CA99} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:48 [DEBUG] device name is not match: \Device\NPF{9AC172F8-4ABB-4EB5-AE3E-2EA348470323} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:48 [DEBUG] device name is not match: \Device\NPF{472E65A2-901D-42D9-8756-6E8E6F1CBAA5} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:48 [DEBUG] device name is not match: \Device\NPF{B092443D-E685-463B-98C6-A45ECC2981BF} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:48 [DEBUG] getGatewayMac: \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 8.8.8.8 2023/07/22 15:38:49 find router mac is a4:56:02:04:80:09 2023/07/22 15:38:50 [DEBUG] fetch mac address: \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} a4:56:02:04:80:09 2023/07/22 15:38:50 [DEBUG] close pcap handler for getGatewayMac 2023/07/22 15:38:50 select adapter of to send packets: &{\Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 192.168.0.2 [] {192.168.0.2 ffffff00} ffffff00 04:d4:c4:ed:7e:53 Realtek PCIe GbE Family Controller a4:56:02:04:80:09} 2023/07/22 15:38:50 API Server listen at 127.0.0.1:8361 2023/07/22 15:38:51 127.0.0.1:53369 POST /api/v1/setEnvi
2023/07/22 15:38:51 127.0.0.1:53370 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion
2023/07/22 15:38:51 127.0.0.1:53371 GET /api/v1/getEnvi?field=ip
2023/07/22 15:38:51 127.0.0.1:53372 GET /api/v1/getEnvi?field=gid,key,godserver
2023/07/22 15:38:51 127.0.0.1:53373 POST /api/v1/getPOCList
2023/07/22 15:38:51 127.0.0.1:53374 GET /api/v1/live
2023/07/22 15:38:51 127.0.0.1:53375 POST /api/v1/getTasks
2023/07/22 15:38:51 127.0.0.1:53378 GET /api/v1/getEnvi?field=licenseInfo,midKey
2023/07/22 15:38:51 [DEBUG] get adapter of device \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:51 [DEBUG] devices: [{\Device\NPF{304D87B7-ABAF-41E2-A815-FBC2E9597303} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{76813B85-26CC-43E9-84A0-7ADA9F70CA99} WAN Miniport (IPv6) 22 []} {\Device\NPF{9AC172F8-4ABB-4EB5-AE3E-2EA348470323} WAN Miniport (IP) 22 []} {\Device\NPF{472E65A2-901D-42D9-8756-6E8E6F1CBAA5} VMware Virtual Ethernet Adapter for VMnet8 22 [{192.168.253.1 ffffff00 192.168.253.255 } {fe80::5beb:6c82:7aed:b191 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{B092443D-E685-463B-98C6-A45ECC2981BF} VMware Virtual Ethernet Adapter for VMnet1 22 [{192.168.248.1 ffffff00 192.168.248.255 } {fe80::c126:e239:62a7:99df ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} Realtek PCIe GbE Family Controller 22 [{192.168.0.2 ffffff00 192.168.0.255 } {fe80::3ded:26fd:2ad2:7f4b ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]}] 2023/07/22 15:38:51 [DEBUG] device name is not match: \Device\NPF{304D87B7-ABAF-41E2-A815-FBC2E9597303} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:51 [DEBUG] device name is not match: \Device\NPF{76813B85-26CC-43E9-84A0-7ADA9F70CA99} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:51 [DEBUG] device name is not match: \Device\NPF{9AC172F8-4ABB-4EB5-AE3E-2EA348470323} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:51 [DEBUG] device name is not match: \Device\NPF{472E65A2-901D-42D9-8756-6E8E6F1CBAA5} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:51 [DEBUG] device name is not match: \Device\NPF{B092443D-E685-463B-98C6-A45ECC2981BF} != \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 2023/07/22 15:38:51 [DEBUG] getGatewayMac: \Device\NPF{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} 0.0.0.0 2023/07/22 15:38:52 find router mac is a4:56:02:04:80:09 2023/07/22 15:38:52 [DEBUG] fetch mac address: \Device\NPF_{75FEF0A6-75D1-4A3E-AB31-37C9237117F2} a4:56:02:04:80:09 2023/07/22 15:38:52 [DEBUG] close pcap handler for getGatewayMac

ipsecc commented 11 months ago

+1

gobysec commented 9 months ago

您可以联系微信号:gobyteam发送一下您详细日志,为您定位问题