gobysec / Goby

Attack surface mapping
https://gobies.org/
1.42k stars 151 forks source link

win+-2.8.3、扫描崩溃 #507

Open jwy0623 opened 5 months ago

jwy0623 commented 5 months ago

024/07/02 16:31:20 [WARNING] change deep-analysis feature is not included in your current license. 2024/07/02 16:31:20 goby.Start.LoadCustomRules() err: open E:\tools\infoget\goby\goby-win-x64-2.8.3\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified. 2024/07/02 16:31:20 goby_config BlackTargets: 2024/07/02 16:31:20 scan 0-9099,9101-65535 222.191.224.42,222.191.224.43,222.191.224.44,222.191.224.45,222.191.224.46 2024/07/02 16:31:20 JumpDefend has been enabled and will automatically configure the HTTP interceptor. 2024/07/02 16:31:20 start port scanner: totalSize: 327675, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 3, Random: true, Seed: 1719909080341340900, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2 2024/07/02 16:31:20 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2024/07/02 16:31:20 127.0.0.1:3530 POST /api/v1/getProgress 2024/07/02 16:31:20 Found web 222.191.224.46 80 2024/07/02 16:31:20 Found app: 222.191.224.46 222.191.224.46 80 Nginx 2024/07/02 16:31:20 DoHttpRequest failed: Get "http://222.191.224.46/never_could_exists": EOF 2024/07/02 16:31:20 Found web 222.191.224.42 80 2024/07/02 16:31:20 DoHttpRequest failed: Get "http://222.191.224.42/never_could_exists": EOF 2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 ASP 2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 ASP.NET 2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 jQuery 2024/07/02 16:31:20 127.0.0.1:3551 POST /api/v1/getStatisticsData 2024/07/02 16:31:20 127.0.0.1:3552 POST /api/v1/getTasks 2024/07/02 16:31:20 found device from route table for 222.191.224.46: \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] get adapter of device \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] devices: [{\Device\NPF{C7C38A09-192F-4B81-9128-07ACD73ADF2C} WAN Miniport (Network Monitor) 22 []} {\Device\NPF{E3110167-1B4E-476B-BEBB-E7D1F91DDE4C} WAN Miniport (IPv6) 22 []} {\Device\NPF{3CF81345-333F-4F1E-8AB3-BCAE5D67676B} WAN Miniport (IP) 22 []} {\Device\NPF{6F42D368-3D19-4994-A967-9A907D947EEB} Bluetooth Device (Personal Area Network) 46 [{fe80::8684:faf0:877d:fd8e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.50.55 ffff0000 169.254.255.255 }]} {\Device\NPF{7A54C04F-9927-40AE-823B-7393DC62B1A3} Intel(R) Wi-Fi 6 AX201 160MHz 30 [{240e:3a2:786:80f0:1698:3e49:89f6:5c3c ffffffffffffffff0000000000000000 240e:3a2:786:80f0:ffff:ffff:ffff:ffff } {240e:3a2:786:80f0:8535:6a50:ed38:2dec ffffffffffffffffffffffffffffffff 240e:3a2:786:80f0:8535:6a50:ed38:2dec } {fe80::f4ed:732f:317:ca8 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.10.31 ffffff00 192.168.10.255 }]} {\Device\NPF{CF62AAB7-A00C-4790-9F33-068DCD22749E} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::a5d7:d869:3cb1:9069 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.220.1 ffffff00 192.168.220.255 }]} {\Device\NPF{0B30788A-0EB5-4BD8-95EE-7DE22BA1285C} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::d971:373a:2372:b117 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.128.1 ffffff00 192.168.128.255 }]} {\Device\NPF{FA828AB5-2C63-431F-9711-7BE148D3AFDE} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::ac78:8590:e840:1ff1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.153.177 ffff0000 169.254.255.255 }]} {\Device\NPF{339990BA-4A9A-4A2D-8BDD-3B4EF516E30A} Microsoft Wi-Fi Direct Virtual Adapter 46 [{fe80::3599:1289:b67d:dc38 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.84.15 ffff0000 169.254.255.255 }]} {\Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} Clash Tunnel 22 [{198.18.0.1 ffff0000 198.18.255.255 }]} {\Device\NPFLoopback Adapter for loopback traffic capture 55 []} {\Device\NPF{34B34899-42D4-4E37-A3C2-58DF7B7F45F7} iNode VPN Virtual NIC 38 [{fe80::45a0:b548:f8be:9080 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {10.2.2.2 ffffff00 10.2.2.255 } {169.254.110.72 ffff0000 169.254.255.255 }]} {\Device\NPF{B069A8F3-0551-4E0A-B64B-A4F336CE154F} OpenVPN Data Channel Offload 38 [{fe80::bc2:8763:d16:787f ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.74.11 ffff0000 169.254.255.255 }]} {\Device\NPF{C393CDB0-5F81-4EDC-91ED-E7A2A0BE9AB8} Realtek USB GbE Family Controller 38 [{fe80::a5b5:ade7:1acf:2308 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.100.59 ffff0000 169.254.255.255 } {192.168.77.217 ffffff00 192.168.77.255 }]} {\Device\NPF{158F103C-415C-49F4-9264-850ADCEF4630} Intel(R) Ethernet Connection (16) I219-V 38 [{fe80::e073:16b4:fc9b:50ee ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.180.206 ffff0000 169.254.255.255 } {200.200.9.234 ffffff00 200.200.9.255 }]} {\Device\NPF{9F05FA57-433D-409A-9485-6A05998D6BB1} TAP-Windows Adapter V9 for OpenVPN Connect 38 [{fe80::2df2:5cf0:d5e:abee ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.90.21 ffff0000 169.254.255.255 }]}] 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{C7C38A09-192F-4B81-9128-07ACD73ADF2C} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{E3110167-1B4E-476B-BEBB-E7D1F91DDE4C} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{3CF81345-333F-4F1E-8AB3-BCAE5D67676B} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{6F42D368-3D19-4994-A967-9A907D947EEB} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{7A54C04F-9927-40AE-823B-7393DC62B1A3} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{CF62AAB7-A00C-4790-9F33-068DCD22749E} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{0B30788A-0EB5-4BD8-95EE-7DE22BA1285C} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{FA828AB5-2C63-431F-9711-7BE148D3AFDE} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF{339990BA-4A9A-4A2D-8BDD-3B4EF516E30A} != \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] getGatewayMac: \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 222.191.224.46 2024/07/02 16:31:21 DoHttpRequest failed: Post "http://222.191.224.46/never_could_exists": EOF 2024/07/02 16:31:21 DoHttpRequest failed: Get "http://222.191.224.46/?id=1%20and%201=1": EOF 2024/07/02 16:31:21 DoHttpRequest failed: Get "http://222.191.224.46/axis2/never_could_exists.jws": EOF 2024/07/02 16:31:21 Found app: 222.191.224.46 222.191.224.46 80 Apache-Shiro 2024/07/02 16:31:21 find router mac is 45:00:00:1f:2b:01 2024/07/02 16:31:22 [DEBUG] fetch mac address: \Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 45:00:00:1f:2b:01 2024/07/02 16:31:22 [DEBUG] close pcap handler for getGatewayMac 2024/07/02 16:31:22 select adapter of to send packets: &{\Device\NPF{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 198.18.0.1 [] {198.18.0.1 ffff0000} ffff0000 Clash Tunnel 45:00:00:1f:2b:01} 2024/07/02 16:31:22 routine-recv start 2024/07/02 16:31:22 port scanner is ready 2024/07/02 16:31:22 routine-target run out ping target pool 2 2024/07/02 16:31:22 alive range after ping2 (5): 222.191.224.42-222.191.224.46 2024/07/02 16:31:22 routine-target start scan common tcp ports 2024/07/02 16:31:22 start first round ARP 2024/07/02 16:31:22 first round ARP done 2024/07/02 16:31:23 127.0.0.1:3855 POST /api/v1/getProgress 2024/07/02 16:31:23 127.0.0.1:3856 POST /api/v1/getStatisticsData 2024/07/02 16:31:23 3.5s 0/327675 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2024/07/02 16:31:23 start sending packets 2024/07/02 16:31:23 [WARNING] Serialize failed: invalid src MAC: 2024/07/02 16:31:23 routine-send out panic: runtime error: index out of range [0] with length 0 goroutine 2359 [running]: github.com/google/gopacket/pcap.(Handle).pcapSendpacket(0xc00a4c9e20?, {0x0?, 0x1f?, 0x0?}) github.com/google/gopacket@v1.1.20-0.20210429153827-3eaba0894325/pcap/pcap_windows.go:658 +0x6d github.com/google/gopacket/pcap.(Handle).WritePacketData(...) github.com/google/gopacket@v1.1.20-0.20210429153827-3eaba0894325/pcap/pcap.go:696 git.gobies.org/goby/portscanner/pcapsend.(PcapSender).sendSYN(0xc0098aa240, 0xdebfe02a, 0x20b) git.gobies.org/goby/portscanner@v0.0.7/pcapsend/send.go:382 +0x192 git.gobies.org/goby/portscanner/pcapsend.(PcapSender).SendPackets(0xc0098aa240, {0x7ff7a3a05cd0, 0xc00ad4c2d0}, 0xc00b815ce0?, 0x12?, 0x2?) git.gobies.org/goby/portscanner@v0.0.7/pcapsend/send.go:1648 +0x77b created by git.gobies.org/goby/portscanner.(*PortScanner).startPcapScan in goroutine 100 git.gobies.org/goby/portscanner@v0.0.7/portscanner.go:219 +0x268

gobysec commented 4 months ago

您好,请升级到最新版本 2.9.5重新扫描尝试,若未解决可联系客服微信:gobyteam