gobysec / Goby

Attack surface mapping
https://gobies.org/
1.4k stars 151 forks source link

goby 不适配深信服atrtus,代理无法扫描,一直报错 #462

Open c0010 opened 1 year ago

c0010 commented 1 year ago

2023/09/15 11:28:55 [DEBUG] runtime.NumCPU():12, runtime.GOMAXPROCS():10 2023/09/15 11:28:55 read user rule file ok: 0 2023/09/15 11:28:55 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/09/15 11:28:55 init repleace log regex len: 3 2023/09/15 11:28:55 Grab version: grab_version1.9.1.0 2023/09/15 11:28:55 Support 344 protocols, 804 ports 2023/09/15 11:28:55 Version: v2.7.5 2023/09/15 11:28:55 init cdn check client: Get "https://cdn.nuclei.sh": read tcp 172.20.10.2:48527->172.66.40.212:443: wsarecv: An existing connection was forcibly closed by the remote host. 2023/09/15 11:28:57 API Server listen at 127.0.0.1:8361 2023/09/15 11:28:57 pcap version: Npcap version 1.75, based on libpcap version 1.10.4 2023/09/15 11:28:57 found device from route table for 8.8.8.8: \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:28:57 [DEBUG] get adapter of device \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:28:57 [DEBUG] devices: [{\Device\NPF{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{172.20.10.2 fffffff0 172.20.10.15 }]} {\Device\NPF{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 38 [{172.10.7.136 ffffff00 172.10.7.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:28:57 [DEBUG] getGatewayMac: \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 8.8.8.8 2023/09/15 11:28:58 127.0.0.1:48661 GET /api/v1/live
2023/09/15 11:28:58 find router mac is 06:bc:6d:6b:cc:64 2023/09/15 11:28:59 127.0.0.1:48671 POST /api/v1/setEnvi
2023/09/15 11:28:59 [DEBUG] fetch mac address: \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 06:bc:6d:6b:cc:64 2023/09/15 11:28:59 [DEBUG] close pcap handler for getGatewayMac 2023/09/15 11:28:59 select adapter of to send packets: &{\Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 172.20.10.2 [] {172.20.10.2 fffffff0} fffffff0 24:41:8c:f9:1a:05 Intel(R) Wi-Fi 6 AX200 160MHz 06:bc:6d:6b:cc:64} 2023/09/15 11:28:59 127.0.0.1:48674 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion
2023/09/15 11:28:59 127.0.0.1:48675 GET /api/v1/getEnvi?field=ip
2023/09/15 11:28:59 127.0.0.1:48676 GET /api/v1/getEnvi?field=gid,key,godserver
2023/09/15 11:28:59 127.0.0.1:48677 POST /api/v1/getPOCList
2023/09/15 11:28:59 127.0.0.1:48678 POST /api/v1/getTasks
2023/09/15 11:29:00 127.0.0.1:48680 GET /api/v1/getEnvi?field=licenseInfo,midKey
2023/09/15 11:29:00 [DEBUG] get adapter of device \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:29:00 [DEBUG] devices: [{\Device\NPF{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{172.20.10.2 fffffff0 172.20.10.15 }]} {\Device\NPF{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 38 [{172.10.7.136 ffffff00 172.10.7.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 2023/09/15 11:29:00 [DEBUG] getGatewayMac: \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 0.0.0.0 2023/09/15 11:29:00 auto-select the fastest DNS server: 223.6.6.6:53 36.53595ms 2023/09/15 11:29:01 find router mac is 06:bc:6d:6b:cc:64 2023/09/15 11:29:01 [DEBUG] fetch mac address: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 06:bc:6d:6b:cc:64 2023/09/15 11:29:01 [DEBUG] close pcap handler for getGatewayMac 2023/09/15 11:43:23 127.0.0.1:9409 GET /api/v1/listAdapters
2023/09/15 11:43:31 127.0.0.1:9440 POST /api/v1/setEnvi
2023/09/15 11:43:35 127.0.0.1:9451 POST /api/v1/setEnvi
2023/09/15 11:43:36 127.0.0.1:9455 POST /api/v1/getTasks
2023/09/15 11:43:38 127.0.0.1:9466 POST /api/v1/getStatisticsData
2023/09/15 11:43:39 127.0.0.1:9468 POST /api/v1/resumeScan
2023/09/15 11:43:39 goby.Start.LoadCustomRules() err: open D:\goby-win-x64-2.7.5-Community\goby-win-x64-2.7.5\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified. 2023/09/15 11:43:39 gobyconfig BlackTargets: 2023/09/15 11:43:39 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 10.11.64.115 2023/09/15 11:43:39 start port scanner: totalSize: 90, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1694746111357905100, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 0 2023/09/15 11:43:39 pcap version: Npcap version 1.75, based on libpcap version 1.10.4 2023/09/15 11:43:39 [DEBUG] get adapter of device \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 127.0.0.1:9469 POST /api/v1/getProgress
2023/09/15 11:43:39 [DEBUG] devices: [{\Device\NPF{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{192.168.137.149 ffffff00 192.168.137.255 }]} {\Device\NPF{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 22 [{169.254.158.132 ffff0000 169.254.255.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{DB5D23C4-6264-4DFF-8D52-C395D62210C0} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} != \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2023/09/15 11:43:39 [DEBUG] getGatewayMac: \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 10.11.64.115 2023/09/15 11:43:40 find router mac is 45:00:00:1f:55:dc 2023/09/15 11:43:41 [DEBUG] fetch mac address: \Device\NPF{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 45:00:00:1f:55:dc 2023/09/15 11:43:41 [DEBUG] close pcap handler for getGatewayMac 2023/09/15 11:43:41 select adapter of to send packets: &{\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2.0.0.1 [] {2.0.0.1 ffffff00} ffffff00 aTrust Tunnel 45:00:00:1f:55:dc} 2023/09/15 11:43:41 routine-recv start 2023/09/15 11:43:41 port scanner is ready 2023/09/15 11:43:41 start first round ARP 2023/09/15 11:43:41 first round ARP done 2023/09/15 11:43:42 127.0.0.1:9487 POST /api/v1/getStatisticsData
2023/09/15 11:43:42 127.0.0.1:9486 POST /api/v1/getProgress
2023/09/15 11:43:42 3.157s 0/90 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2023/09/15 11:43:42 start sending packets 2023/09/15 11:43:42 [WARNING] Serialize failed: invalid src MAC: 2023/09/15 11:43:42 routine-send out panic: runtime error: index out of range [0] with length 0

goroutine 156 [running]: github.com/google/gopacket/pcap.(Handle).pcapSendpacket(0xc001fdf1a0?, {0x0?, 0x1f?, 0x0?}) github.com/google/gopacket@v1.1.20-0.20210429153827-3eaba0894325/pcap/pcap_windows.go:658 +0x76 github.com/google/gopacket/pcap.(Handle).WritePacketData(...) github.com/google/gopacket@v1.1.20-0.20210429153827-3eaba0894325/pcap/pcap.go:696 git.gobies.org/goby/portscanner/pcapsend.(PcapSender).sendUDP(0xc008116750, 0xa0b4073, 0x8438) git.gobies.org/goby/portscanner@v0.0.6/pcapsend/send.go:1165 +0x20f git.gobies.org/goby/portscanner/pcapsend.(PcapSender).SendPackets(0xc008116750, {0x326e090, 0xc006ad8400}, 0x0?, 0x0?, 0x0?) git.gobies.org/goby/portscanner@v0.0.6/pcapsend/send.go:1676 +0x74a created by git.gobies.org/goby/portscanner.(*PortScanner).startPcapScan git.gobies.org/goby/portscanner@v0.0.6/portscanner.go:219 +0x28a

gobysec commented 12 months ago

已收到您的反馈,我们尽快优化,优化后会向您致谢,您可以联系微信号:gobyteam,感谢您对Goby喜爱与支持~

gobysec commented 12 months ago

重装pcap,如还有报错请携带操作系统架构添加微信号gobyteam,为您解决~