gobysec / Goby

Attack surface mapping
https://gobies.org/
1.36k stars 149 forks source link

goby运行发生未知错误 #451

Open IceBerryy opened 11 months ago

IceBerryy commented 11 months ago

报错详情: 2023/08/03 16:23:38 [DEBUG] runtime.NumCPU():12, runtime.GOMAXPROCS():10 2023/08/03 16:23:38 read user rule file ok: 0 2023/08/03 16:23:38 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/08/03 16:23:38 init repleace log regex len: 3 2023/08/03 16:23:38 Grab version: grab_version1.9.1.0 2023/08/03 16:23:38 Support 343 protocols, 803 ports 2023/08/03 16:23:38 Version: v2.6.1 2023/08/03 16:23:39 API Server listen at 127.0.0.1:8361 2023/08/03 16:23:39 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2023/08/03 16:23:40 found device from route table for 8.8.8.8: \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:40 [DEBUG] get adapter of device \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:40 [DEBUG] devices: [{\Device\NPF{4EE94CA7-E5D4-43A5-A0BE-8EBD54CA598C} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7B7576A2-EBF5-4317-B001-51B83D61064F} WAN Miniport (IPv6) 22 []} {\Device\NPF{5615EBFB-F81C-4090-BA4E-AEA3A42E3F53} WAN Miniport (IP) 22 []} {\Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} Intel(R) Wi-Fi 6E AX211 160MHz 30 [{fe80::ca3c:69eb:2482:baeb ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {100.64.1.32 ffff0000 100.64.255.255 }]} {\Device\NPF{A0BEA5DB-A9F6-407A-9449-E3C4AB3A9933} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::f7eb:8d79:99f4:5a4d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.130.1 ffffff00 192.168.130.255 }]} {\Device\NPF{DDB4B3FF-3BA4-4686-AF73-6EC34AE2BD5F} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::c864:7f0:d596:a76 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.232.1 ffffff00 192.168.232.255 }]} {\Device\NPF{8EBE973E-DFAB-48CE-9DE6-81A6168EFB26} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::81bf:6036:23dd:e038 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.116.210 ffff0000 169.254.255.255 }]} {\Device\NPF_{96177ECC-0670-456D-9BC2-A112853F13F1} Microsoft Wi-Fi Direct Virtual Adapter 46 [{fe80::f1ee:e827:d56f:395a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.23.144 ffff0000 169.254.255.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []} {\Device\NPF{3988E328-1852-440D-A62B-40E1563E89B8} TAP-Windows Adapter V9 38 [{fe80::c2c6:3f9a:bf7b:d503 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.247.92 ffff0000 169.254.255.255 }]} {\Device\NPF{3FBE3F8B-9E6E-4B34-960A-2CA441A44B2B} Virtual Secure Domain Adapter V2 38 [{fe80::ebc9:adfd:a1a2:7fbe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.172.75 ffff0000 169.254.255.255 }]} {\Device\NPF{E006940B-1EE3-4DA6-8100-35685D9AC339} Realtek Gaming GbE Family Controller 38 [{fe80::9ceb:41a0:354a:479c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {10.80.70.84 ffffff00 10.80.70.255 } {169.254.121.13 ffff0000 169.254.255.255 }]} {\Device\NPF{3067562B-03D7-46D6-861C-00188E2FA298} TAP-Windows Adapter V9 for OpenVPN Connect 38 [{fe80::25cd:8d43:6ec1:d65b ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.165.109 ffff0000 169.254.255.255 }]} {\Device\NPF{EE89888B-171B-47E7-AD92-B779E261C4F6} SSL VPN Client Virtual Network Adapter 38 [{fe80::1c3e:5a6:5fc4:80ec ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.69.143 ffff0000 169.254.255.255 }]}] 2023/08/03 16:23:40 [DEBUG] device name is not match: \Device\NPF{4EE94CA7-E5D4-43A5-A0BE-8EBD54CA598C} != \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:40 [DEBUG] device name is not match: \Device\NPF{7B7576A2-EBF5-4317-B001-51B83D61064F} != \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:40 [DEBUG] device name is not match: \Device\NPF{5615EBFB-F81C-4090-BA4E-AEA3A42E3F53} != \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:40 [DEBUG] getGatewayMac: \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 8.8.8.8 2023/08/03 16:23:41 127.0.0.1:58499 GET /api/v1/live 2023/08/03 16:23:41 127.0.0.1:58501 POST /api/v1/setEnvi 2023/08/03 16:23:41 127.0.0.1:58520 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion 2023/08/03 16:23:41 127.0.0.1:58521 GET /api/v1/getEnvi?field=ip 2023/08/03 16:23:41 127.0.0.1:58522 GET /api/v1/getEnvi?field=gid,key,godserver 2023/08/03 16:23:41 127.0.0.1:58523 POST /api/v1/getPOCList 2023/08/03 16:23:41 127.0.0.1:58525 POST /api/v1/getTasks 2023/08/03 16:23:41 127.0.0.1:58529 GET /api/v1/getEnvi?field=licenseInfo,midKey 2023/08/03 16:23:41 find router mac is 4c:09:b4:fc:a4:10 2023/08/03 16:23:41 [DEBUG] get adapter of device \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:41 [DEBUG] devices: [{\Device\NPF{4EE94CA7-E5D4-43A5-A0BE-8EBD54CA598C} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{7B7576A2-EBF5-4317-B001-51B83D61064F} WAN Miniport (IPv6) 22 []} {\Device\NPF{5615EBFB-F81C-4090-BA4E-AEA3A42E3F53} WAN Miniport (IP) 22 []} {\Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} Intel(R) Wi-Fi 6E AX211 160MHz 30 [{fe80::ca3c:69eb:2482:baeb ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {100.64.1.32 ffff0000 100.64.255.255 }]} {\Device\NPF{A0BEA5DB-A9F6-407A-9449-E3C4AB3A9933} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::f7eb:8d79:99f4:5a4d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.130.1 ffffff00 192.168.130.255 }]} {\Device\NPF{DDB4B3FF-3BA4-4686-AF73-6EC34AE2BD5F} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::c864:7f0:d596:a76 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.232.1 ffffff00 192.168.232.255 }]} {\Device\NPF{8EBE973E-DFAB-48CE-9DE6-81A6168EFB26} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::81bf:6036:23dd:e038 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.116.210 ffff0000 169.254.255.255 }]} {\Device\NPF{96177ECC-0670-456D-9BC2-A112853F13F1} Microsoft Wi-Fi Direct Virtual Adapter 46 [{fe80::f1ee:e827:d56f:395a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.23.144 ffff0000 169.254.255.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []} {\Device\NPF{3988E328-1852-440D-A62B-40E1563E89B8} TAP-Windows Adapter V9 38 [{fe80::c2c6:3f9a:bf7b:d503 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.247.92 ffff0000 169.254.255.255 }]} {\Device\NPF{3FBE3F8B-9E6E-4B34-960A-2CA441A44B2B} Virtual Secure Domain Adapter V2 38 [{fe80::ebc9:adfd:a1a2:7fbe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.172.75 ffff0000 169.254.255.255 }]} {\Device\NPF{E006940B-1EE3-4DA6-8100-35685D9AC339} Realtek Gaming GbE Family Controller 38 [{fe80::9ceb:41a0:354a:479c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {10.80.70.84 ffffff00 10.80.70.255 } {169.254.121.13 ffff0000 169.254.255.255 }]} {\Device\NPF{3067562B-03D7-46D6-861C-00188E2FA298} TAP-Windows Adapter V9 for OpenVPN Connect 38 [{fe80::25cd:8d43:6ec1:d65b ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.165.109 ffff0000 169.254.255.255 }]} {\Device\NPF{EE89888B-171B-47E7-AD92-B779E261C4F6} SSL VPN Client Virtual Network Adapter 38 [{fe80::1c3e:5a6:5fc4:80ec ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.69.143 ffff0000 169.254.255.255 }]}] 2023/08/03 16:23:41 [DEBUG] device name is not match: \Device\NPF{4EE94CA7-E5D4-43A5-A0BE-8EBD54CA598C} != \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:41 [DEBUG] device name is not match: \Device\NPF{7B7576A2-EBF5-4317-B001-51B83D61064F} != \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:41 [DEBUG] device name is not match: \Device\NPF{5615EBFB-F81C-4090-BA4E-AEA3A42E3F53} != \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 2023/08/03 16:23:41 [DEBUG] getGatewayMac: \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 0.0.0.0 2023/08/03 16:23:42 [DEBUG] fetch mac address: \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 4c:09:b4:fc:a4:10 2023/08/03 16:23:42 [DEBUG] close pcap handler for getGatewayMac 2023/08/03 16:23:42 select adapter of to send packets: &{\Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 100.64.1.32 [fe80::ca3c:69eb:2482:baeb] {100.64.1.32 ffff0000} ffff0000 38:7a:0e:a1:4f:05 Intel(R) Wi-Fi 6E AX211 160MHz 4c:09:b4:fc:a4:10} 2023/08/03 16:23:42 find router mac is 4c:09:b4:fc:a4:10 2023/08/03 16:23:42 [DEBUG] fetch mac address: \Device\NPF{D022C437-6853-4967-B196-0C4E833CF509} 4c:09:b4:fc:a4:10 2023/08/03 16:23:42 [DEBUG] close pcap handler for getGatewayMac 2023/08/03 16:23:53 127.0.0.1:59483 POST /api/v1/getPOCList

gobysec commented 9 months ago

您可以联系微信号:gobyteam发送一下您详细日志,为您定位问题