gobysec / Goby

Attack surface mapping
https://gobies.org/
1.4k stars 151 forks source link

警告 #442

Closed EvilCY closed 1 year ago

EvilCY commented 1 year ago

发生未知错误,Goby 将尝试重启解决。若重启后错误仍存在,请反馈给我们。 Github issue

错误详情: Error 2023/07/23 22:30:16 [DEBUG] runtime.NumCPU():12, runtime.GOMAXPROCS():10 2023/07/23 22:30:16 read user rule file ok: 0 2023/07/23 22:30:16 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/07/23 22:30:16 init repleace log regex len: 3 2023/07/23 22:30:16 Grab version: grab_version1.9.1.0 2023/07/23 22:30:16 Support 343 protocols, 803 ports 2023/07/23 22:30:16 Version: v2.6.0 2023/07/23 22:30:18 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2023/07/23 22:30:19 found device from route table for 8.8.8.8: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF{E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}] 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:19 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 8.8.8.8 2023/07/23 22:30:20 find router mac is 00:e0:4c:ae:64:a9 2023/07/23 22:30:21 [DEBUG] fetch mac address: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9 2023/07/23 22:30:21 [DEBUG] close pcap handler for getGatewayMac 2023/07/23 22:30:21 select adapter of to send packets: &{\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 192.168.3.172 [fe80::170b:8fdd:ff87:3a47] {192.168.3.172 ffffff00} ffffff00 b4:69:21:87:f8:6b Intel(R) Wireless-AC 9560 00:e0:4c:ae:64:a9} 2023/07/23 22:30:21 API Server listen at 127.0.0.1:8361 2023/07/23 22:30:21 127.0.0.1:49370 POST /api/v1/setEnvi 2023/07/23 22:30:21 127.0.0.1:49377 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion 2023/07/23 22:30:21 127.0.0.1:49378 GET /api/v1/getEnvi?field=ip 2023/07/23 22:30:21 127.0.0.1:49379 GET /api/v1/getEnvi?field=gid,key,godserver 2023/07/23 22:30:21 127.0.0.1:49380 POST /api/v1/getPOCList 2023/07/23 22:30:21 load poc E:\e\迅雷下载\goby-win-x64-1.8.239\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors) 2023/07/23 22:30:21 vul name contains ',' which is not allowed: Cisco-Small-Business-RV-Series-Routers-Multiple-Command-Execution-Vulnerabilities-(CVE-2022-20705--CVE-2022-20707).json goroutine 57 [running]: runtime/debug.Stack() runtime/debug/stack.go:24 +0x65 git.gobies.org/goby/goby/api.getPOCListHandler.func1() git.gobies.org/goby/goby/api/getPOCList.go:95 +0x128 panic({0x22bef00, 0xc00894eff0}) runtime/panic.go:838 +0x207 git.gobies.org/goby/goscanner/exploits.NewExploit({0xc0075aef00?, 0x1c00894ec30?}, {0x0?, 0xc002723530?}, 0x0, 0x0, {0x0?, 0xc002723530?, 0x22bef00?}) git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:87 +0x1d4 git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonFile(0xc000d72ad0?, {0xc0075aef00?, 0xc00578ed68?}) git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:217 +0x3b git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonDir.func1({0xc0075aef00, 0xb2}, {0x35d2d50, 0xc003bb9110}, {0x0?, 0x0?}) git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:272 +0x399 path/filepath.walk({0xc0075aef00, 0xb2}, {0x35d2d50, 0xc003bb9110}, 0xc00578f160) path/filepath/path.go:430 +0x123 path/filepath.walk({0xc0080b5540, 0x3a}, {0x35d2d50, 0xc0031b0380}, 0xc00578f160) path/filepath/path.go:454 +0x285 path/filepath.walk({0xc0080b5100, 0x35}, {0x35d2d50, 0xc0031b02a0}, 0xc00578f160) path/filepath/path.go:454 +0x285 path/filepath.Walk({0xc0080b5100, 0x35}, 0xc008bc7160) path/filepath/path.go:517 +0x6c git.gobies.org/goby/goscanner/exploits.(ExploitManager).LoadJsonDir(0xc000d72a50, {0xc0080b4b40, 0x35}, 0x0) git.gobies.org/goby/goscanner@v0.0.6/exploits/0exploit.go:320 +0x26b git.gobies.org/goby/goscanner.NewFofaScanner(0xc008bbbb80) git.gobies.org/goby/goscanner@v0.0.6/goscanner.go:49 +0x3b git.gobies.org/goby/goby.(GobyScanner).VulScanner(0xc0001ad500) git.gobies.org/goby/goby/goby_vul_scanner.go:240 +0x51 git.gobies.org/goby/goby.(GobyScanner).ReloadExploits(0xc0001ad500, 0x0?, 0x1) git.gobies.org/goby/goby/goby_vul_scanner.go:179 +0xdd git.gobies.org/goby/goby/api.getPOCListHandler({0x35cbd70, 0xc008ba6000}, 0xc001cb2100?) git.gobies.org/goby/goby/api/getPOCList.go:134 +0x50a net/http.HandlerFunc.ServeHTTP(...) net/http/server.go:2084 git.gobies.org/goby/goby/api.basicAuth.func1({0x35cbd70?, 0xc008ba6000?}, 0x88?) git.gobies.org/goby/goby/api/api.go:115 +0x248 net/http.HandlerFunc.ServeHTTP(...) net/http/server.go:2084 git.gobies.org/goby/goby/api.logHttpRequest.func1({0x35cbd70, 0xc008ba6000}, 0xc001cb2100) git.gobies.org/goby/goby/api/api.go:98 +0x1f4 net/http.HandlerFunc.ServeHTTP(0xc001cb2000?, {0x35cbd70?, 0xc008ba6000?}, 0x0?) net/http/server.go:2084 +0x2f github.com/gorilla/mux.(Router).ServeHTTP(0xc0086b4000, {0x35cbd70, 0xc008ba6000}, 0xc000ae2700) github.com/gorilla/mux@v1.8.0/mux.go:210 +0x1cf net/http.serverHandler.ServeHTTP({0x35c6f50?}, {0x35cbd70, 0xc008ba6000}, 0xc000ae2700) net/http/server.go:2916 +0x43b net/http.(conn).serve(0xc0086d4000, {0x35ccd78, 0xc006895740}) net/http/server.go:1966 +0x5d7 created by net/http.(Server).Serve net/http/server.go:3071 +0x4db 2023/07/23 22:30:21 127.0.0.1:49386 GET /api/v1/live 2023/07/23 22:30:21 127.0.0.1:49387 POST /api/v1/getTasks 2023/07/23 22:30:22 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF{E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}] 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:22 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 0.0.0.0 2023/07/23 22:30:22 127.0.0.1:49409 GET /api/v1/getEnvi?field=licenseInfo,midKey 2023/07/23 22:30:23 find router mac is 00:e0:4c:ae:64:a9 2023/07/23 22:30:23 [DEBUG] fetch mac address: \Device\NPF_{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9 2023/07/23 22:30:23 [DEBUG] close pcap handler for getGatewayMac 2023/07/23 22:30:24 127.0.0.1:49460 POST /api/v1/getStatisticsData 2023/07/23 22:30:26 127.0.0.1:49501 POST /api/v1/resumeScan 2023/07/23 22:30:26 goby.Start.LoadCustomRules() err: open E:\e\迅雷下载\goby-win-x64-1.8.239\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified. 2023/07/23 22:30:26 gobyconfig BlackTargets: 2023/07/23 22:30:26 scan 0-65535 124.71.178.118 2023/07/23 22:30:26 start port scanner: totalSize: 65536, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1690095981725194700, ScanOffset: 65536, ScanICMP: false, CheckAliveMode: 0 2023/07/23 22:30:26 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2023/07/23 22:30:26 127.0.0.1:49504 POST /api/v1/getProgress 2023/07/23 22:30:27 found device from route table for 124.71.178.118: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] get adapter of device \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] devices: [{\Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} WAN Miniport (IPv6) 22 []} {\Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} WAN Miniport (IP) 22 []} {\Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} Hyper-V Virtual Ethernet Adapter #2 22 [{fe80::a126:73de:a88d:9696 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.31.128.1 fffff000 172.31.143.255 }]} {\Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} Hyper-V Virtual Ethernet Adapter 22 [{fe80::6648:d4fc:4f8f:87c9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {172.17.16.1 fffff000 172.17.31.255 }]} {\Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} Bluetooth Device (Personal Area Network) #2 46 [{fe80::13da:b4ed:9961:e533 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.91.219 ffff0000 169.254.255.255 }]} {\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} Intel(R) Wireless-AC 9560 30 [{fe80::170b:8fdd:ff87:3a47 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.3.172 ffffff00 192.168.3.255 }]} {\Device\NPF{7CB72DE9-6D62-46C1-A5FE-1B604AE09C8C} Microsoft Wi-Fi Direct Virtual Adapter #4 30 [{fe80::e9a8:553:f464:eb86 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.137.1 ffffff00 192.168.137.255 }]} {\Device\NPF{E8EB94B0-F715-4CEE-9526-DE65335F797B} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{fe80::b105:b18a:a86d:dea2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.214.138 ffff0000 169.254.255.255 }]} {\Device\NPF_{AF2AE58E-0325-468A-9369-CC2E6FACAA49} Realtek Gaming GbE Family Controller 6 [{fe80::c279:5406:fe0e:9645 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.115.255 ffff0000 169.254.255.255 } {192.168.3.173 ffffff00 192.168.3.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []}] 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{7FE13896-4476-444E-9DB4-565D6AE18959} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{7D0D3CDD-285F-4517-B1E7-6F8A4550B19B} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{C9BD622D-D120-4EF9-AC1E-454ED826C047} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{328A2B8C-87CB-4DC2-A26E-5C06EAFE491F} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{73267EE6-E8D5-4AF5-94A0-404381B69577} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] device name is not match: \Device\NPF{94FD4E34-0EE1-4089-AB34-3778BC9F1F39} != \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 2023/07/23 22:30:27 [DEBUG] getGatewayMac: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 124.71.178.118 2023/07/23 22:30:28 find router mac is 00:e0:4c:ae:64:a9 2023/07/23 22:30:29 [DEBUG] fetch mac address: \Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 00:e0:4c:ae:64:a9 2023/07/23 22:30:29 [DEBUG] close pcap handler for getGatewayMac 2023/07/23 22:30:29 select adapter of to send packets: &{\Device\NPF{06BB1F60-8428-4BF4-B2BA-81E0A5FF2EC7} 192.168.3.172 [fe80::170b:8fdd:ff87:3a47] {192.168.3.172 ffffff00} ffffff00 b4:69:21:87:f8:6b Intel(R) Wireless-AC 9560 00:e0:4c:ae:64:a9} 2023/07/23 22:30:29 routine-recv start 2023/07/23 22:30:29 port scanner is ready 2023/07/23 22:30:29 routine-target start scan common tcp ports 2023/07/23 22:30:29 routine-target run out common target pool 2023/07/23 22:30:29 routine-target is about to exit since target pool is running out 2023/07/23 22:30:29 routine-target is exit since target pool and retry pool is running out 2023/07/23 22:30:29 start first round ARP 2023/07/23 22:30:29 first round ARP done 2023/07/23 22:30:29 127.0.0.1:49570 POST /api/v1/getProgress 2023/07/23 22:30:29 127.0.0.1:49571 POST /api/v1/getStatisticsData 2023/07/23 22:30:30 3.775s 65536/65536 (100.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2023/07/23 22:30:30 routine-status is exit since scan is done 2023/07/23 22:30:30 start sending packets 2023/07/23 22:30:30 not start another round ARP 2023/07/23 22:30:30 routine-send out 2023/07/23 22:30:30 GrabScannerStatistics: {0 0 0 1} 2023/07/23 22:30:30 AppScannerStatistics: {0 0 0 1} 2023/07/23 22:30:30 SendPacketCount: 65536 65536 2023/07/23 22:30:32 127.0.0.1:49636 POST /api/v1/getStatisticsData 2023/07/23 22:30:32 127.0.0.1:49635 POST /api/v1/getProgress 2023/07/23 22:30:35 127.0.0.1:49808 POST /api/v1/getStatisticsData 2023/07/23 22:30:35 127.0.0.1:49807 POST /api/v1/getProgress 2023/07/23 22:30:36 BasicNetworkInfoScanner out... 2023/07/23 22:30:38 127.0.0.1:49874 POST /api/v1/getProgress 2023/07/23 22:30:38 127.0.0.1:49875 POST /api/v1/getStatisticsData 2023/07/23 22:30:40 close pcap sender 2023/07/23 22:30:40 routine-recv out 2023/07/23 22:30:40 routine-pcap-sender is exit 2023/07/23 22:30:40 done: 13.95s 65536/65536 (100.00%) send: 0; recv: 0 2023/07/23 22:30:40 PortScanner out... 2023/07/23 22:30:41 127.0.0.1:50201 POST /api/v1/getStatisticsData 2023/07/23 22:30:41 127.0.0.1:50200 POST /api/v1/getProgress 2023/07/23 22:30:44 127.0.0.1:50367 POST /api/v1/getStatisticsData 2023/07/23 22:30:44 127.0.0.1:50366 POST /api/v1/getProgress 2023/07/23 22:30:46 GrabScanner out... 2023/07/23 22:30:46 AppScanner out... 2023/07/23 22:30:46 finished all information, now try to find vulnerabilities... 2023/07/23 22:30:46 load poc E:\e\迅雷下载\goby-win-x64-1.8.239\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors) 2023/07/23 22:30:46 [INFO] broadcast: error vul name contains ',' which is not allowed: Cisco-Small-Business-RV-Series-Routers-Multiple-Command-Execution-Vulnerabilities-(CVE-2022-20705--CVE-2022-20707).json

gobysec commented 1 year ago

Goby不支持json格式漏洞,请前往golib>exp;oits>user删除json格式漏洞。