gobysec / Goby

Attack surface mapping
https://gobies.org/
1.42k stars 151 forks source link

执行漏洞扫描时Crash #477

Closed hudeqiseed closed 10 months ago

hudeqiseed commented 11 months ago

scan_error.log

hudeqiseed commented 11 months ago

发生未知错误,Goby 将尝试重启解决。若重启后错误仍存在,请反馈给我们。 Github issue

错误详情: Error 2023/12/13 10:34:16 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/12/13 10:34:16 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/12/13 10:34:16 init repleace log regex len: 3 2023/12/13 10:34:16 Grab version: grab_version1.9.1.0 2023/12/13 10:34:16 Support 346 protocols, 806 ports 2023/12/13 10:34:16 [DEBUG] runtime.NumCPU():8, runtime.GOMAXPROCS():6 2023/12/13 10:34:16 try to load user products rules: C:\Users\hudeqi\Desktop\goby-win-x64-2.8.4-redteam\goby-win-x64-2.8.4\golib\rules\user\rule.json 2023/12/13 10:34:16 read user rule file ok: 0 2023/12/13 10:34:16 load json dir C:\Users\hudeqi\Desktop\goby-win-x64-2.8.4-redteam\goby-win-x64-2.8.4\golib\2fa1261927f43973 error: CreateFile C:\Users\hudeqi\Desktop\goby-win-x64-2.8.4-redteam\goby-win-x64-2.8.4\golib\2fa1261927f43973: The system cannot find the file specified. 2023/12/13 10:34:16 load archive dir C:\Users\hudeqi\Desktop\goby-win-x64-2.8.4-redteam\goby-win-x64-2.8.4\golib\2fa1261927f43973 error: open C:\Users\hudeqi\Desktop\goby-win-x64-2.8.4-redteam\goby-win-x64-2.8.4\golib\2fa1261927f43973: The system cannot find the file specified. 2023/12/13 10:34:16 Version: v2.8.4 beta 2023/12/13 10:34:16 LicenseName: redteam 2023/12/13 10:34:18 API Server listen at 127.0.0.1:8361 2023/12/13 10:34:18 pcap version: Npcap version 1.72, based on libpcap version 1.10.2-PRE-GIT 2023/12/13 10:34:18 found device from route table for 8.8.8.8: \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:18 [DEBUG] get adapter of device \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:18 [DEBUG] devices: [{\Device\NPF{C804E3C6-3C59-4ED1-8125-B3EB37BC8A63} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{40504DF2-6EBA-46D6-9D30-89DC172A20AE} WAN Miniport (IPv6) 22 []} {\Device\NPF{00E2CF60-D34B-4579-8868-394958DCFD63} WAN Miniport (IP) 22 []} {\Device\NPF{D0A88712-70B5-4D97-8F6B-B7F023AA5BA1} Bluetooth Device (Personal Area Network) #2 46 [{169.254.76.152 ffff0000 169.254.255.255 } {fe80::c215:d761:cea1:6bee ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} Intel(R) Wi-Fi 6 AX201 160MHz 30 [{10.47.5.19 ffffff00 10.47.5.255 } {fe80::b1e6:d67c:dfc0:b54b ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{D994BED7-A7EC-4C94-BACC-853288662B74} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.175.89 ffff0000 169.254.255.255 } {fe80::820d:41ef:9d36:12a7 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{0DAF9A9B-EAFC-4733-9E03-E2924BDD2689} Microsoft Wi-Fi Direct Virtual Adapter 46 [{169.254.199.152 ffff0000 169.254.255.255 } {fe80::34f1:f773:7a4a:ce66 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF{D34436B1-445E-4075-9189-B43A0D96D34E} Realtek PCIe GbE Family Controller 38 [{172.30.113.224 fffffe00 172.30.113.255 } {fe80::bb90:699f:39e9:272e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2023/12/13 10:34:18 [DEBUG] device name is not match: \Device\NPF{C804E3C6-3C59-4ED1-8125-B3EB37BC8A63} != \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:18 [DEBUG] device name is not match: \Device\NPF{40504DF2-6EBA-46D6-9D30-89DC172A20AE} != \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:18 [DEBUG] device name is not match: \Device\NPF{00E2CF60-D34B-4579-8868-394958DCFD63} != \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:18 [DEBUG] device name is not match: \Device\NPF{D0A88712-70B5-4D97-8F6B-B7F023AA5BA1} != \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:18 [DEBUG] getGatewayMac: \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 8.8.8.8 2023/12/13 10:34:18 127.0.0.1:33270 GET /api/v1/live 2023/12/13 10:34:18 127.0.0.1:33271 POST /api/v1/setEnvi 2023/12/13 10:34:19 127.0.0.1:33272 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion 2023/12/13 10:34:19 127.0.0.1:33273 GET /api/v1/getEnvi?field=ip 2023/12/13 10:34:19 127.0.0.1:33274 GET /api/v1/getEnvi?field=gid,key,godserver 2023/12/13 10:34:19 127.0.0.1:33275 POST /api/v1/getPOCList 2023/12/13 10:34:19 127.0.0.1:33276 POST /api/v1/getTasks 2023/12/13 10:34:19 127.0.0.1:33277 POST /api/v1/getTasks 2023/12/13 10:34:19 find router mac is ec:a1:d1:39:74:76 2023/12/13 10:34:19 127.0.0.1:33279 GET /api/v1/getEnvi?field=licenseInfo,midKey 2023/12/13 10:34:19 [DEBUG] get adapter of device \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:19 [DEBUG] devices: [{\Device\NPF{C804E3C6-3C59-4ED1-8125-B3EB37BC8A63} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{40504DF2-6EBA-46D6-9D30-89DC172A20AE} WAN Miniport (IPv6) 22 []} {\Device\NPF{00E2CF60-D34B-4579-8868-394958DCFD63} WAN Miniport (IP) 22 []} {\Device\NPF{D0A88712-70B5-4D97-8F6B-B7F023AA5BA1} Bluetooth Device (Personal Area Network) #2 46 [{169.254.76.152 ffff0000 169.254.255.255 } {fe80::c215:d761:cea1:6bee ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} Intel(R) Wi-Fi 6 AX201 160MHz 30 [{10.47.5.19 ffffff00 10.47.5.255 } {fe80::b1e6:d67c:dfc0:b54b ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF{D994BED7-A7EC-4C94-BACC-853288662B74} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.175.89 ffff0000 169.254.255.255 } {fe80::820d:41ef:9d36:12a7 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{0DAF9A9B-EAFC-4733-9E03-E2924BDD2689} Microsoft Wi-Fi Direct Virtual Adapter 46 [{169.254.199.152 ffff0000 169.254.255.255 } {fe80::34f1:f773:7a4a:ce66 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF{D34436B1-445E-4075-9189-B43A0D96D34E} Realtek PCIe GbE Family Controller 38 [{172.30.113.224 fffffe00 172.30.113.255 } {fe80::bb90:699f:39e9:272e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2023/12/13 10:34:19 [DEBUG] device name is not match: \Device\NPF{C804E3C6-3C59-4ED1-8125-B3EB37BC8A63} != \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:19 [DEBUG] device name is not match: \Device\NPF{40504DF2-6EBA-46D6-9D30-89DC172A20AE} != \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:19 [DEBUG] device name is not match: \Device\NPF{00E2CF60-D34B-4579-8868-394958DCFD63} != \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:19 [DEBUG] device name is not match: \Device\NPF{D0A88712-70B5-4D97-8F6B-B7F023AA5BA1} != \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 2023/12/13 10:34:19 [DEBUG] getGatewayMac: \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 0.0.0.0 2023/12/13 10:34:19 1380 POC were successfully loaded 2023/12/13 10:34:20 [DEBUG] fetch mac address: \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} ec:a1:d1:39:74:76 2023/12/13 10:34:20 [DEBUG] close pcap handler for getGatewayMac 2023/12/13 10:34:20 select adapter of to send packets: &{\Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} 10.47.5.19 [] {10.47.5.19 ffffff00} ffffff00 98:8d:46:a1:1a:94 Intel(R) Wi-Fi 6 AX201 160MHz ec:a1:d1:39:74:76} 2023/12/13 10:34:20 find router mac is ec:a1:d1:39:74:76 2023/12/13 10:34:20 [DEBUG] fetch mac address: \Device\NPF{46C62736-A99E-42B7-899C-19E6FABE93E5} ec:a1:d1:39:74:76 2023/12/13 10:34:20 [DEBUG] close pcap handler for getGatewayMac 2023/12/13 10:34:21 auto-select the fastest DNS server: 223.5.5.5:53 7.32575ms 2023/12/13 10:34:23 127.0.0.1:33294 POST /api/v1/getStatisticsData 2023/12/13 10:34:27 127.0.0.1:33300 POST /api/v1/getPOCList 2023/12/13 10:34:33 127.0.0.1:33313 POST /api/v1/rescanVulnerability panic: runtime error: invalid memory address or nil pointer dereference [signal 0xc0000005 code=0x0 addr=0x0 pc=0x7ff793591d77] goroutine 61 [running]: git.gobies.org/goby/goby.(GobyScanner).updatedbStart(0x0) git.gobies.org/goby/goby/goby_base.go:60 +0x17 git.gobies.org/goby/goby.(GobyScanner).ScanVuls(0x0, 0x1) git.gobies.org/goby/goby/goby_vul_scanner.go:434 +0x91 git.gobies.org/goby/goby/api.rescanVulnerabilityHandler.func2() git.gobies.org/goby/goby/api/rescanVulnerability.go:99 +0x1f created by git.gobies.org/goby/goby/api.rescanVulnerabilityHandler in goroutine 28 git.gobies.org/goby/goby/api/rescanVulnerability.go:98 +0x75c

gobysec commented 11 months ago

此问题已修复,已在最新版本中发布,若紧急情况可联系微信:gobyteam协助您解决!感谢您的反馈与支持~