Closed EvilCY closed 1 year ago
发生未知错误,Goby 将尝试重启解决。若重启后错误仍存在,请反馈给我们。 Github issue
错误详情: Error 2023/07/23 22:30:16 [DEBUG] runtime.NumCPU():12, runtime.GOMAXPROCS():10 2023/07/23 22:30:16 read user rule file ok: 0 2023/07/23 22:30:16 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/07/23 22:30:16 init repleace log regex len: 3 2023/07/23 22:30:16 Grab version: grab_version1.9.1.0 2023/07/23 22:30:16 Support 343 protocols, 803 ports 2023/07/23 22:30:16 Version: v2.6.0 2023/07/23 22:30:18 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2023/07/23 22:30:19 found device from route table for 8.8.8.8: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF{E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}] 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 8.8.8.8 2023/07/23 22:30:20 find router mac is 00:e0:4c:ae:64:a9 2023/07/23 22:30:21 [DEBUG] fetch mac address: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9 2023/07/23 22:30:21 [DEBUG] close pcap handler for getGatewayMac 2023/07/23 22:30:21 select adapter of to send packets: &{\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 192.168.3.172 [fe80::170b:8fdd:ff87:3a47] {192.168.3.172 ffffff00} ffffff00 b4:69:21:87:f8:6b Intel(R) Wireless-AC 9560 00:e0:4c:ae:64:a9} 2023/07/23 22:30:21 API Server listen at 127.0.0.1:8361 2023/07/23 22:30:21 127.0.0.1:49370 POST /api/v1/setEnvi 2023/07/23 22:30:21 127.0.0.1:49377 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion 2023/07/23 22:30:21 127.0.0.1:49378 GET /api/v1/getEnvi?field=ip 2023/07/23 22:30:21 127.0.0.1:49379 GET /api/v1/getEnvi?field=gid,key,godserver 2023/07/23 22:30:21 127.0.0.1:49380 POST /api/v1/getPOCList 2023/07/23 22:30:21 load poc E:\e\迅雷下载\goby-win-x64-1.8.239\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors) 2023/07/23 22:30:21 vul name contains ',' which is not allowed: Cisco-Small-Business-RV-Series-Routers-Multiple-Command-Execution-Vulnerabilities-(CVE-2022-20705--CVE-2022-20707).json goroutine 57 [running]: runtime/debug.Stack() runtime/debug/stack.go:24 +0x65 git.gobies.org/goby/goby/api.getPOCListHandler.func1() git.gobies.org/goby/goby/api/getPOCList.go:95 +0x128 panic({0x22bef00, 0xc00894eff0}) runtime/panic.go:838 +0x207 git.gobies.org/goby/goscanner/exploits.NewExploit({0xc0075aef00?, 0x1c00894ec30?}, {0x0?, 0xc002723530?}, 0x0, 0x0, {0x0?, 0xc002723530?, 0x22bef00?}) git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:87 +0x1d4 git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonFile(0xc000d72ad0?, {0xc0075aef00?, 0xc00578ed68?}) git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:217 +0x3b git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonDir.func1({0xc0075aef00, 0xb2}, {0x35d2d50, 0xc003bb9110}, {0x0?, 0x0?}) git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:272 +0x399 path/filepath.walk({0xc0075aef00, 0xb2}, {0x35d2d50, 0xc003bb9110}, 0xc00578f160) path/filepath/path.go:430 +0x123 path/filepath.walk({0xc0080b5540, 0x3a}, {0x35d2d50, 0xc0031b0380}, 0xc00578f160) path/filepath/path.go:454 +0x285 path/filepath.walk({0xc0080b5100, 0x35}, {0x35d2d50, 0xc0031b02a0}, 0xc00578f160) path/filepath/path.go:454 +0x285 path/filepath.Walk({0xc0080b5100, 0x35}, 0xc008bc7160) path/filepath/path.go:517 +0x6c git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonDir(0xc000d72a50, {0xc0080b4b40, 0x35}, 0x0) git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:320 +0x26b git.gobies.org/goby/goscanner.NewFofaScanner(0xc008bbbb80) git.gobies.org/goby/goscanner@v0.0.6/goscanner.go:49 +0x3b git.gobies.org/goby/goby.(GobyScanner).VulScanner(0xc0001ad500) git.gobies.org/goby/goby/goby_vul_scanner.go:240 +0x51 git.gobies.org/goby/goby.(GobyScanner).ReloadExploits(0xc0001ad500, 0x0?, 0x1) git.gobies.org/goby/goby/goby_vul_scanner.go:179 +0xdd git.gobies.org/goby/goby/api.getPOCListHandler({0x35cbd70, 0xc008ba6000}, 0xc001cb2100?) git.gobies.org/goby/goby/api/getPOCList.go:134 +0x50a net/http.HandlerFunc.ServeHTTP(...) net/http/server.go:2084 git.gobies.org/goby/goby/api.basicAuth.func1({0x35cbd70?, 0xc008ba6000?}, 0x88?) git.gobies.org/goby/goby/api/api.go:115 +0x248 net/http.HandlerFunc.ServeHTTP(...) net/http/server.go:2084 git.gobies.org/goby/goby/api.logHttpRequest.func1({0x35cbd70, 0xc008ba6000}, 0xc001cb2100) git.gobies.org/goby/goby/api/api.go:98 +0x1f4 net/http.HandlerFunc.ServeHTTP(0xc001cb2000?, {0x35cbd70?, 0xc008ba6000?}, 0x0?) net/http/server.go:2084 +0x2f github.com/gorilla/mux.(Router).ServeHTTP(0xc0086b4000, {0x35cbd70, 0xc008ba6000}, 0xc000ae2700) github.com/gorilla/mux@v1.8.0/mux.go:210 +0x1cf net/http.serverHandler.ServeHTTP({0x35c6f50?}, {0x35cbd70, 0xc008ba6000}, 0xc000ae2700) net/http/server.go:2916 +0x43b net/http.(conn).serve(0xc0086d4000, {0x35ccd78, 0xc006895740}) net/http/server.go:1966 +0x5d7 created by net/http.(Server).Serve net/http/server.go:3071 +0x4db 2023/07/23 22:30:21 127.0.0.1:49386 GET /api/v1/live 2023/07/23 22:30:21 127.0.0.1:49387 POST /api/v1/getTasks 2023/07/23 22:30:22 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF{E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}] 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 0.0.0.0 2023/07/23 22:30:22 127.0.0.1:49409 GET /api/v1/getEnvi?field=licenseInfo,midKey 2023/07/23 22:30:23 find router mac is 00:e0:4c:ae:64:a9 2023/07/23 22:30:23 [DEBUG] fetch mac address: \Device\NPF_{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9 2023/07/23 22:30:23 [DEBUG] close pcap handler for getGatewayMac 2023/07/23 22:30:24 127.0.0.1:49460 POST /api/v1/getStatisticsData 2023/07/23 22:30:26 127.0.0.1:49501 POST /api/v1/resumeScan 2023/07/23 22:30:26 goby.Start.LoadCustomRules() err: open E:\e\迅雷下载\goby-win-x64-1.8.239\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified. 2023/07/23 22:30:26 gobyconfig BlackTargets: 2023/07/23 22:30:26 scan 0-65535 124.71.178.118 2023/07/23 22:30:26 start port scanner: totalSize: 65536, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1690095981725194700, ScanOffset: 65536, ScanICMP: false, CheckAliveMode: 0 2023/07/23 22:30:26 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2023/07/23 22:30:26 127.0.0.1:49504 POST /api/v1/getProgress 2023/07/23 22:30:27 found device from route table for 124.71.178.118: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF{E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}] 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 124.71.178.118 2023/07/23 22:30:28 find router mac is 00:e0:4c:ae:64:a9 2023/07/23 22:30:29 [DEBUG] fetch mac address: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9 2023/07/23 22:30:29 [DEBUG] close pcap handler for getGatewayMac 2023/07/23 22:30:29 select adapter of to send packets: &{\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 192.168.3.172 [fe80::170b:8fdd:ff87:3a47] {192.168.3.172 ffffff00} ffffff00 b4:69:21:87:f8:6b Intel(R) Wireless-AC 9560 00:e0:4c:ae:64:a9} 2023/07/23 22:30:29 routine-recv start 2023/07/23 22:30:29 port scanner is ready 2023/07/23 22:30:29 routine-target start scan common tcp ports 2023/07/23 22:30:29 routine-target run out common target pool 2023/07/23 22:30:29 routine-target is about to exit since target pool is running out 2023/07/23 22:30:29 routine-target is exit since target pool and retry pool is running out 2023/07/23 22:30:29 start first round ARP 2023/07/23 22:30:29 first round ARP done 2023/07/23 22:30:29 127.0.0.1:49570 POST /api/v1/getProgress 2023/07/23 22:30:29 127.0.0.1:49571 POST /api/v1/getStatisticsData 2023/07/23 22:30:30 3.775s 65536/65536 (100.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2023/07/23 22:30:30 routine-status is exit since scan is done 2023/07/23 22:30:30 start sending packets 2023/07/23 22:30:30 not start another round ARP 2023/07/23 22:30:30 routine-send out 2023/07/23 22:30:30 GrabScannerStatistics: {0 0 0 1} 2023/07/23 22:30:30 AppScannerStatistics: {0 0 0 1} 2023/07/23 22:30:30 SendPacketCount: 65536 65536 2023/07/23 22:30:32 127.0.0.1:49636 POST /api/v1/getStatisticsData 2023/07/23 22:30:32 127.0.0.1:49635 POST /api/v1/getProgress 2023/07/23 22:30:35 127.0.0.1:49808 POST /api/v1/getStatisticsData 2023/07/23 22:30:35 127.0.0.1:49807 POST /api/v1/getProgress 2023/07/23 22:30:36 BasicNetworkInfoScanner out... 2023/07/23 22:30:38 127.0.0.1:49874 POST /api/v1/getProgress 2023/07/23 22:30:38 127.0.0.1:49875 POST /api/v1/getStatisticsData 2023/07/23 22:30:40 close pcap sender 2023/07/23 22:30:40 routine-recv out 2023/07/23 22:30:40 routine-pcap-sender is exit 2023/07/23 22:30:40 done: 13.95s 65536/65536 (100.00%) send: 0; recv: 0 2023/07/23 22:30:40 PortScanner out... 2023/07/23 22:30:41 127.0.0.1:50201 POST /api/v1/getStatisticsData 2023/07/23 22:30:41 127.0.0.1:50200 POST /api/v1/getProgress 2023/07/23 22:30:44 127.0.0.1:50367 POST /api/v1/getStatisticsData 2023/07/23 22:30:44 127.0.0.1:50366 POST /api/v1/getProgress 2023/07/23 22:30:46 GrabScanner out... 2023/07/23 22:30:46 AppScanner out... 2023/07/23 22:30:46 finished all information, now try to find vulnerabilities... 2023/07/23 22:30:46 load poc E:\e\迅雷下载\goby-win-x64-1.8.239\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors) 2023/07/23 22:30:46 [INFO] broadcast: error vul name contains ',' which is not allowed: Cisco-Small-Business-RV-Series-Routers-Multiple-Command-Execution-Vulnerabilities-(CVE-2022-20705--CVE-2022-20707).json
Goby不支持json格式漏洞,请前往golib>exp;oits>user删除json格式漏洞。
发生未知错误,Goby 将尝试重启解决。若重启后错误仍存在,请反馈给我们。 Github issue
错误详情: Error 2023/07/23 22:30:16 [DEBUG] runtime.NumCPU():12, runtime.GOMAXPROCS():10 2023/07/23 22:30:16 read user rule file ok: 0 2023/07/23 22:30:16 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/07/23 22:30:16 init repleace log regex len: 3 2023/07/23 22:30:16 Grab version: grab_version1.9.1.0 2023/07/23 22:30:16 Support 343 protocols, 803 ports 2023/07/23 22:30:16 Version: v2.6.0 2023/07/23 22:30:18 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2023/07/23 22:30:19 found device from route table for 8.8.8.8: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff} {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF {73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF {06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF {E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}]
2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:19 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 8.8.8.8
2023/07/23 22:30:20 find router mac is 00:e0:4c:ae:64:a9
2023/07/23 22:30:21 [DEBUG] fetch mac address: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9
2023/07/23 22:30:21 [DEBUG] close pcap handler for getGatewayMac
2023/07/23 22:30:21 select adapter of to send packets: &{\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 192.168.3.172 [fe80::170b:8fdd:ff87:3a47] {192.168.3.172 ffffff00} ffffff00 b4:69:21:87:f8:6b Intel(R) Wireless-AC 9560 00:e0:4c:ae:64:a9}
2023/07/23 22:30:21 API Server listen at 127.0.0.1:8361
2023/07/23 22:30:21 127.0.0.1:49370 POST /api/v1/setEnvi
2023/07/23 22:30:21 127.0.0.1:49377 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion
2023/07/23 22:30:21 127.0.0.1:49378 GET /api/v1/getEnvi?field=ip
2023/07/23 22:30:21 127.0.0.1:49379 GET /api/v1/getEnvi?field=gid,key,godserver
2023/07/23 22:30:21 127.0.0.1:49380 POST /api/v1/getPOCList
2023/07/23 22:30:21 load poc E:\e\迅雷下载\goby-win-x64-1.8.239\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors)
2023/07/23 22:30:21 vul name contains ',' which is not allowed: Cisco-Small-Business-RV-Series-Routers-Multiple-Command-Execution-Vulnerabilities-(CVE-2022-20705--CVE-2022-20707).json
goroutine 57 [running]:
runtime/debug.Stack()
runtime/debug/stack.go:24 +0x65
git.gobies.org/goby/goby/api.getPOCListHandler.func1()
git.gobies.org/goby/goby/api/getPOCList.go:95 +0x128
panic({0x22bef00, 0xc00894eff0})
runtime/panic.go:838 +0x207
git.gobies.org/goby/goscanner/exploits.NewExploit({0xc0075aef00?, 0x1c00894ec30?}, {0x0?, 0xc002723530?}, 0x0, 0x0, {0x0?, 0xc002723530?, 0x22bef00?})
git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:87 +0x1d4
git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonFile(0xc000d72ad0?, {0xc0075aef00?, 0xc00578ed68?})
git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:217 +0x3b
git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonDir.func1({0xc0075aef00, 0xb2}, {0x35d2d50, 0xc003bb9110}, {0x0?, 0x0?})
git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:272 +0x399
path/filepath.walk({0xc0075aef00, 0xb2}, {0x35d2d50, 0xc003bb9110}, 0xc00578f160)
path/filepath/path.go:430 +0x123
path/filepath.walk({0xc0080b5540, 0x3a}, {0x35d2d50, 0xc0031b0380}, 0xc00578f160)
path/filepath/path.go:454 +0x285
path/filepath.walk({0xc0080b5100, 0x35}, {0x35d2d50, 0xc0031b02a0}, 0xc00578f160)
path/filepath/path.go:454 +0x285
path/filepath.Walk({0xc0080b5100, 0x35}, 0xc008bc7160)
path/filepath/path.go:517 +0x6c
git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonDir(0xc000d72a50, {0xc0080b4b40, 0x35}, 0x0)
git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:320 +0x26b
git.gobies.org/goby/goscanner.NewFofaScanner(0xc008bbbb80)
git.gobies.org/goby/goscanner@v0.0.6/goscanner.go:49 +0x3b
git.gobies.org/goby/goby.(GobyScanner).VulScanner(0xc0001ad500)
git.gobies.org/goby/goby/goby_vul_scanner.go:240 +0x51
git.gobies.org/goby/goby.(GobyScanner).ReloadExploits(0xc0001ad500, 0x0?, 0x1)
git.gobies.org/goby/goby/goby_vul_scanner.go:179 +0xdd
git.gobies.org/goby/goby/api.getPOCListHandler({0x35cbd70, 0xc008ba6000}, 0xc001cb2100?)
git.gobies.org/goby/goby/api/getPOCList.go:134 +0x50a
net/http.HandlerFunc.ServeHTTP(...)
net/http/server.go:2084
git.gobies.org/goby/goby/api.basicAuth.func1({0x35cbd70?, 0xc008ba6000?}, 0x88?)
git.gobies.org/goby/goby/api/api.go:115 +0x248
net/http.HandlerFunc.ServeHTTP(...)
net/http/server.go:2084
git.gobies.org/goby/goby/api.logHttpRequest.func1({0x35cbd70, 0xc008ba6000}, 0xc001cb2100)
git.gobies.org/goby/goby/api/api.go:98 +0x1f4
net/http.HandlerFunc.ServeHTTP(0xc001cb2000?, {0x35cbd70?, 0xc008ba6000?}, 0x0?)
net/http/server.go:2084 +0x2f
github.com/gorilla/mux.(Router).ServeHTTP(0xc0086b4000, {0x35cbd70, 0xc008ba6000}, 0xc000ae2700)
github.com/gorilla/mux@v1.8.0/mux.go:210 +0x1cf
net/http.serverHandler.ServeHTTP({0x35c6f50?}, {0x35cbd70, 0xc008ba6000}, 0xc000ae2700)
net/http/server.go:2916 +0x43b
net/http.(conn).serve(0xc0086d4000, {0x35ccd78, 0xc006895740})
net/http/server.go:1966 +0x5d7
created by net/http.(Server).Serve
net/http/server.go:3071 +0x4db
2023/07/23 22:30:21 127.0.0.1:49386 GET /api/v1/live
2023/07/23 22:30:21 127.0.0.1:49387 POST /api/v1/getTasks
2023/07/23 22:30:22 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:22 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF {73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF {06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF {E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}]
2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:22 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 0.0.0.0
2023/07/23 22:30:22 127.0.0.1:49409 GET /api/v1/getEnvi?field=licenseInfo,midKey
2023/07/23 22:30:23 find router mac is 00:e0:4c:ae:64:a9
2023/07/23 22:30:23 [DEBUG] fetch mac address: \Device\NPF_{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9
2023/07/23 22:30:23 [DEBUG] close pcap handler for getGatewayMac
2023/07/23 22:30:24 127.0.0.1:49460 POST /api/v1/getStatisticsData
2023/07/23 22:30:26 127.0.0.1:49501 POST /api/v1/resumeScan
2023/07/23 22:30:26 goby.Start.LoadCustomRules() err: open E:\e\迅雷下载\goby-win-x64-1.8.239\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified.
2023/07/23 22:30:26 gobyconfig BlackTargets:
2023/07/23 22:30:26 scan 0-65535 124.71.178.118
2023/07/23 22:30:26 start port scanner: totalSize: 65536, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1690095981725194700, ScanOffset: 65536, ScanICMP: false, CheckAliveMode: 0
2023/07/23 22:30:26 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT
2023/07/23 22:30:26 127.0.0.1:49504 POST /api/v1/getProgress
2023/07/23 22:30:27 found device from route table for 124.71.178.118: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:27 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:27 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF {73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF {06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF {E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}]
2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7}
2023/07/23 22:30:27 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 124.71.178.118
2023/07/23 22:30:28 find router mac is 00:e0:4c:ae:64:a9
2023/07/23 22:30:29 [DEBUG] fetch mac address: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9
2023/07/23 22:30:29 [DEBUG] close pcap handler for getGatewayMac
2023/07/23 22:30:29 select adapter of to send packets: &{\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 192.168.3.172 [fe80::170b:8fdd:ff87:3a47] {192.168.3.172 ffffff00} ffffff00 b4:69:21:87:f8:6b Intel(R) Wireless-AC 9560 00:e0:4c:ae:64:a9}
2023/07/23 22:30:29 routine-recv start
2023/07/23 22:30:29 port scanner is ready
2023/07/23 22:30:29 routine-target start scan common tcp ports
2023/07/23 22:30:29 routine-target run out common target pool
2023/07/23 22:30:29 routine-target is about to exit since target pool is running out
2023/07/23 22:30:29 routine-target is exit since target pool and retry pool is running out
2023/07/23 22:30:29 start first round ARP
2023/07/23 22:30:29 first round ARP done
2023/07/23 22:30:29 127.0.0.1:49570 POST /api/v1/getProgress
2023/07/23 22:30:29 127.0.0.1:49571 POST /api/v1/getStatisticsData
2023/07/23 22:30:30 3.775s 65536/65536 (100.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2023/07/23 22:30:30 routine-status is exit since scan is done
2023/07/23 22:30:30 start sending packets
2023/07/23 22:30:30 not start another round ARP
2023/07/23 22:30:30 routine-send out
2023/07/23 22:30:30 GrabScannerStatistics: {0 0 0 1}
2023/07/23 22:30:30 AppScannerStatistics: {0 0 0 1}
2023/07/23 22:30:30 SendPacketCount: 65536 65536
2023/07/23 22:30:32 127.0.0.1:49636 POST /api/v1/getStatisticsData
2023/07/23 22:30:32 127.0.0.1:49635 POST /api/v1/getProgress
2023/07/23 22:30:35 127.0.0.1:49808 POST /api/v1/getStatisticsData
2023/07/23 22:30:35 127.0.0.1:49807 POST /api/v1/getProgress
2023/07/23 22:30:36 BasicNetworkInfoScanner out...
2023/07/23 22:30:38 127.0.0.1:49874 POST /api/v1/getProgress
2023/07/23 22:30:38 127.0.0.1:49875 POST /api/v1/getStatisticsData
2023/07/23 22:30:40 close pcap sender
2023/07/23 22:30:40 routine-recv out
2023/07/23 22:30:40 routine-pcap-sender is exit
2023/07/23 22:30:40 done: 13.95s 65536/65536 (100.00%) send: 0; recv: 0
2023/07/23 22:30:40 PortScanner out...
2023/07/23 22:30:41 127.0.0.1:50201 POST /api/v1/getStatisticsData
2023/07/23 22:30:41 127.0.0.1:50200 POST /api/v1/getProgress
2023/07/23 22:30:44 127.0.0.1:50367 POST /api/v1/getStatisticsData
2023/07/23 22:30:44 127.0.0.1:50366 POST /api/v1/getProgress
2023/07/23 22:30:46 GrabScanner out...
2023/07/23 22:30:46 AppScanner out...
2023/07/23 22:30:46 finished all information, now try to find vulnerabilities...
2023/07/23 22:30:46 load poc E:\e\迅雷下载\goby-win-x64-1.8.239\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors)
2023/07/23 22:30:46 [INFO] broadcast: error vul name contains ',' which is not allowed: Cisco-Small-Business-RV-Series-Routers-Multiple-Command-Execution-Vulnerabilities-(CVE-2022-20705--CVE-2022-20707).json