gobysec / Goby

Attack surface mapping
https://gobies.org/
1.39k stars 151 forks source link

linux Centos7 启动扫描,是报错了吗,扫不到资产信息 ,但是同版本号的window版本是可以扫到3个资产信息的 #510

Open hahazhouyz opened 3 weeks ago

hahazhouyz commented 3 weeks ago

2024/08/23 09:43:56 192.168.10.97:56164 POST /api/v1/startScan
2024/08/23 09:43:56 [WARNING] change deep-analysis feature is not included in your current license. 2024/08/23 09:43:56 goby.Start.LoadCustomRules() err: open /home/programs/goby/goby-linux-x64-2.5.2/golib/rules/user/cdn-header-rule.json: no such file or directory 2024/08/23 09:43:56 goby_config BlackTargets: 2024/08/23 09:43:56 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.10.8 2024/08/23 09:43:56 start port scanner: totalSize: 91, rate: 1000, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1724377436583961984, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2 2024/08/23 09:43:56 pcap version: libpcap version 1.9.1 (with TPACKET_V3) 2024/08/23 09:43:56 found device from route table for 192.168.10.8: eno2 2024/08/23 09:43:56 [DEBUG] get adapter of device eno2 2024/08/23 09:43:56 [DEBUG] devices: [{eno1 22 [{192.168.11.241 ffffff00 192.168.11.255 } {fe80::2090:5e16:8170:add7 ffffffffffffffff0000000000000000 }]} {veth8eb5be8 22 [{fe80::a85b:bdff:feeb:de5b ffffffffffffffff0000000000000000 }]} {vethae1cc68 22 [{fe80::1cb6:a2ff:fe04:295c ffffffffffffffff0000000000000000 }]} {br-73c2da7e490e 22 [{172.21.0.1 ffff0000 172.21.255.255 } {fe80::42:2bff:feb9:78ea ffffffffffffffff0000000000000000 }]} {vethaf86800 22 [{fe80::b4d0:68ff:fee0:3a19 ffffffffffffffff0000000000000000 }]} {veth6537756 22 [{fe80::9c86:d0ff:fe67:e9f2 ffffffffffffffff0000000000000000 }]} {lo 55 [{127.0.0.1 ff000000 } {::1 ffffffffffffffffffffffffffffffff }]} {any Pseudo-device that captures on all interfaces 54 []} {docker0 34 [{172.17.0.1 ffff0000 172.17.255.255 }]} {eno2 34 [{192.168.100.1 ffffff00 192.168.100.255 } {fe80::fea:383c:a7b3:bedf ffffffffffffffff0000000000000000 }]} {nflog Linux netfilter log (NFLOG) interface 48 []} {nfqueue Linux netfilter queue (NFQUEUE) interface 48 []} {usbmon0 Raw USB traffic, all USB buses 48 []} {usbmon1 Raw USB traffic, bus number 1 0 []} {usbmon2 Raw USB traffic, bus number 2 0 []} {usbmon3 Raw USB traffic, bus number 3 0 []} {usbmon4 Raw USB traffic, bus number 4 0 []}] 2024/08/23 09:43:56 [DEBUG] device name is not match: eno1 != eno2 2024/08/23 09:43:56 [DEBUG] device name is not match: veth8eb5be8 != eno2 2024/08/23 09:43:56 [DEBUG] device name is not match: vethae1cc68 != eno2 2024/08/23 09:43:56 [DEBUG] device name is not match: br-73c2da7e490e != eno2 2024/08/23 09:43:56 [DEBUG] device name is not match: vethaf86800 != eno2 2024/08/23 09:43:56 [DEBUG] device name is not match: veth6537756 != eno2 2024/08/23 09:43:56 [DEBUG] device name is not match: lo != eno2 2024/08/23 09:43:56 [DEBUG] device name is not match: any != eno2 2024/08/23 09:43:56 [DEBUG] device name is not match: docker0 != eno2 2024/08/23 09:43:56 [DEBUG] getGatewayMac: eno2 192.168.10.8 2024/08/23 09:43:57 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired 2024/08/23 09:43:58 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired 2024/08/23 09:43:59 [DEBUG] fetch mac address timeout: eno2 2024/08/23 09:43:59 ReadPacketData error: EOF 2024/08/23 09:43:59 [DEBUG] close pcap handler for getGatewayMac 2024/08/23 09:43:59 [DEBUG] fetch gateway mac failed: eno2 2024/08/23 09:43:59 select adapter of to send packets: &{eno2 192.168.100.1 [] {192.168.100.1 ffffff00} ffffff00 ac:1f:6b:b5:48:e9 } 2024/08/23 09:43:59 routine-recv start 2024/08/23 09:43:59 port scanner is ready 2024/08/23 09:43:59 routine-target run out ping target pool 2 2024/08/23 09:43:59 alive range after ping2 (1): 192.168.10.8 2024/08/23 09:43:59 start first round ARP 2024/08/23 09:43:59 first round ARP done 2024/08/23 09:44:00 4.114s 0/91 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2024/08/23 09:44:00 start sending packets 2024/08/23 09:44:00 [WARNING] can not determine dst mac of packet for 192.168.10.8 2024/08/23 09:44:00 routine-target is about to exit since target pool is running out 2024/08/23 09:44:00 routine-target is exit since target pool and retry pool is running out 2024/08/23 09:44:00 not start another round ARP 2024/08/23 09:44:00 routine-send out 2024/08/23 09:44:01 GrabScannerStatistics: {0 0 0 1} 2024/08/23 09:44:01 AppScannerStatistics: {0 0 0 1} 2024/08/23 09:44:01 SendPacketCount: 91 91 2024/08/23 09:44:01 5.114s 91/91 (100.00% 0s left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2024/08/23 09:44:01 routine-status is exit since scan is done 2024/08/23 09:44:06 BasicNetworkInfoScanner out... 2024/08/23 09:44:10 close pcap sender 2024/08/23 09:44:10 routine-recv out 2024/08/23 09:44:11 routine-pcap-sender is exit 2024/08/23 09:44:11 done: 15.178s 91/91 (100.00%) send: 0; recv: 0 2024/08/23 09:44:11 PortScanner out... 2024/08/23 09:44:16 GrabScanner out... 2024/08/23 09:44:16 AppScanner out... 2024/08/23 09:44:16 no need to scan vulnerabilities, cause not any ip assets 2024/08/23 09:44:16 scan task all finished, now out!

gobysec commented 2 weeks ago

您好,可以添加微信在线客服:gobyteam提供具体操作步骤和截图帮您分析解决