gobysec / Goby

Attack surface mapping
https://gobies.org/
1.36k stars 149 forks source link

扫描报错 #465

Closed So4ms closed 8 months ago

So4ms commented 9 months ago

发生未知错误,Goby 将尝试重启解决。若重启后错误仍存在,请反馈给我们。 Github issue

错误详情: Error 2023/09/15 21:18:53 [DEBUG] runtime.NumCPU():16, runtime.GOMAXPROCS():14 2023/09/15 21:18:53 read user rule file ok: 0 2023/09/15 21:18:53 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/09/15 21:18:53 init repleace log regex len: 3 2023/09/15 21:18:53 Grab version: grab_version1.9.1.0 2023/09/15 21:18:53 Support 344 protocols, 804 ports 2023/09/15 21:18:53 Version: v2.7.3 2023/09/15 21:18:55 API Server listen at 127.0.0.1:8361 2023/09/15 21:18:56 pcap version: Npcap version 1.76, based on libpcap version 1.10.4 2023/09/15 21:18:56 127.0.0.1:50512 POST /api/v1/setEnvi 2023/09/15 21:18:57 found device from route table for 8.8.8.8: \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:57 [DEBUG] get adapter of device \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:57 [DEBUG] devices: [{\Device\NPF{BA4F4300-4D0F-4A8E-8C79-723A0737CD85} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{AF3BBEF6-E450-4762-82FA-86414735B5AC} WAN Miniport (IPv6) 22 []} {\Device\NPF{B420A4FD-C0F9-447D-A154-BE0131D50931} WAN Miniport (IP) 22 []} {\Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter 30 [{192.168.31.188 ffffff00 192.168.31.255 } {fe80::60a1:c244:abd2:e9ef ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{6EE8909B-9C8D-4414-99EF-69DA49A89F95} VMware Virtual Ethernet Adapter for VMnet8 22 [{192.168.40.1 ffffff00 192.168.40.255 } {fe80::484:59ad:a982:a565 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{843CE1E2-780A-4377-BEDE-E5A0629E3FCB} VMware Virtual Ethernet Adapter for VMnet1 22 [{192.168.202.1 ffffff00 192.168.202.255 } {fe80::4488:1512:396d:2b6a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{45235FB0-3DF5-4F93-B7A4-665874C6298C} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.46.13 ffff0000 169.254.255.255 } {fe80::8b0c:7c2b:1d87:976d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{B71AED60-4141-4840-B6A2-9F7F9EAFEB32} Microsoft Wi-Fi Direct Virtual Adapter 46 [{169.254.215.90 ffff0000 169.254.255.255 } {fe80::a0e0:9400:bba6:7c6d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF{7CDC33A6-EEEE-4CB7-A254-FD5BC348760B} Wintun Userspace Tunnel 38 [{169.254.3.228 ffff0000 169.254.255.255 } {fe80::ea8e:a779:d4fc:7984 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2023/09/15 21:18:57 [DEBUG] device name is not match: \Device\NPF{BA4F4300-4D0F-4A8E-8C79-723A0737CD85} != \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:57 [DEBUG] device name is not match: \Device\NPF{AF3BBEF6-E450-4762-82FA-86414735B5AC} != \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:57 [DEBUG] device name is not match: \Device\NPF{B420A4FD-C0F9-447D-A154-BE0131D50931} != \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:57 127.0.0.1:50515 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion 2023/09/15 21:18:57 127.0.0.1:50516 GET /api/v1/getEnvi?field=ip 2023/09/15 21:18:57 127.0.0.1:50517 GET /api/v1/getEnvi?field=gid,key,godserver 2023/09/15 21:18:57 127.0.0.1:50518 POST /api/v1/getPOCList 2023/09/15 21:18:57 127.0.0.1:50519 GET /api/v1/live 2023/09/15 21:18:57 127.0.0.1:50520 POST /api/v1/getTasks 2023/09/15 21:18:57 load poc D:\security\pentest\Vulnerability_exploitationtools\goby\goby-win-x64-2.7.3\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: .go:98:8: illegal character U+FF1A ':' (and 1 more errors) 2023/09/15 21:18:57 [DEBUG] getGatewayMac: \Device\NPF_{0AACB9A4-E21E-4997-A73C-AF356101F683} 8.8.8.8 2023/09/15 21:18:57 vul name contains ',' which is not allowed: Cisco-Small-Business-RV-Series-Routers-Multiple-Command-Execution-Vulnerabilities-(CVE-2022-20705--CVE-2022-20707).json 2023/09/15 21:18:58 127.0.0.1:50525 GET /api/v1/getEnvi?field=licenseInfo,midKey 2023/09/15 21:18:58 load poc D:\security\pentest\Vulnerability_exploitation_tools\goby\goby-win-x64-2.7.3\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstageRCE.go error: 99:12: not enough arguments in call to 2023/09/15 21:18:58 find router mac is 24:cf:24:31:ea:d2 2023/09/15 21:18:58 [DEBUG] get adapter of device \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:58 [DEBUG] devices: [{\Device\NPF{BA4F4300-4D0F-4A8E-8C79-723A0737CD85} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{AF3BBEF6-E450-4762-82FA-86414735B5AC} WAN Miniport (IPv6) 22 []} {\Device\NPF{B420A4FD-C0F9-447D-A154-BE0131D50931} WAN Miniport (IP) 22 []} {\Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter 30 [{192.168.31.188 ffffff00 192.168.31.255 } {fe80::60a1:c244:abd2:e9ef ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{6EE8909B-9C8D-4414-99EF-69DA49A89F95} VMware Virtual Ethernet Adapter for VMnet8 22 [{192.168.40.1 ffffff00 192.168.40.255 } {fe80::484:59ad:a982:a565 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{843CE1E2-780A-4377-BEDE-E5A0629E3FCB} VMware Virtual Ethernet Adapter for VMnet1 22 [{192.168.202.1 ffffff00 192.168.202.255 } {fe80::4488:1512:396d:2b6a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{45235FB0-3DF5-4F93-B7A4-665874C6298C} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.46.13 ffff0000 169.254.255.255 } {fe80::8b0c:7c2b:1d87:976d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{B71AED60-4141-4840-B6A2-9F7F9EAFEB32} Microsoft Wi-Fi Direct Virtual Adapter 46 [{169.254.215.90 ffff0000 169.254.255.255 } {fe80::a0e0:9400:bba6:7c6d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF{7CDC33A6-EEEE-4CB7-A254-FD5BC348760B} Wintun Userspace Tunnel 38 [{169.254.3.228 ffff0000 169.254.255.255 } {fe80::ea8e:a779:d4fc:7984 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2023/09/15 21:18:58 [DEBUG] device name is not match: \Device\NPF{BA4F4300-4D0F-4A8E-8C79-723A0737CD85} != \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:58 [DEBUG] device name is not match: \Device\NPF{AF3BBEF6-E450-4762-82FA-86414735B5AC} != \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:58 [DEBUG] device name is not match: \Device\NPF{B420A4FD-C0F9-447D-A154-BE0131D50931} != \Device\NPF{0AACB9A4-E21E-4997-A73C-AF356101F683} 2023/09/15 21:18:58 [DEBUG] getGatewayMac: \Device\NPF_{0AACB9A4-E21E-4997-A73C-AF356101F683} 0.0.0.0 2023/09/15 21:18:58 [WARNING] ParseString error: 1 error(s) decoding:

gobysec commented 9 months ago

此问题已修复,已在最新版本中发布,若紧急情况可联系微信:gobyteam协助您解决!感谢您的反馈与支持~