2024/08/23 09:43:56 192.168.10.97:56164 POST /api/v1/startScan
2024/08/23 09:43:56 [WARNING] change deep-analysis feature is not included in your current license.
2024/08/23 09:43:56 goby.Start.LoadCustomRules() err: open /home/programs/goby/goby-linux-x64-2.5.2/golib/rules/user/cdn-header-rule.json: no such file or directory
2024/08/23 09:43:56 goby_config BlackTargets:
2024/08/23 09:43:56 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.10.8
2024/08/23 09:43:56 start port scanner: totalSize: 91, rate: 1000, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1724377436583961984, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2
2024/08/23 09:43:56 pcap version: libpcap version 1.9.1 (with TPACKET_V3)
2024/08/23 09:43:56 found device from route table for 192.168.10.8: eno2
2024/08/23 09:43:56 [DEBUG] get adapter of device eno2
2024/08/23 09:43:56 [DEBUG] devices: [{eno1 22 [{192.168.11.241 ffffff00 192.168.11.255 } {fe80::2090:5e16:8170:add7 ffffffffffffffff0000000000000000 }]} {veth8eb5be8 22 [{fe80::a85b:bdff:feeb:de5b ffffffffffffffff0000000000000000 }]} {vethae1cc68 22 [{fe80::1cb6:a2ff:fe04:295c ffffffffffffffff0000000000000000 }]} {br-73c2da7e490e 22 [{172.21.0.1 ffff0000 172.21.255.255 } {fe80::42:2bff:feb9:78ea ffffffffffffffff0000000000000000 }]} {vethaf86800 22 [{fe80::b4d0:68ff:fee0:3a19 ffffffffffffffff0000000000000000 }]} {veth6537756 22 [{fe80::9c86:d0ff:fe67:e9f2 ffffffffffffffff0000000000000000 }]} {lo 55 [{127.0.0.1 ff000000 } {::1 ffffffffffffffffffffffffffffffff }]} {any Pseudo-device that captures on all interfaces 54 []} {docker0 34 [{172.17.0.1 ffff0000 172.17.255.255 }]} {eno2 34 [{192.168.100.1 ffffff00 192.168.100.255 } {fe80::fea:383c:a7b3:bedf ffffffffffffffff0000000000000000 }]} {nflog Linux netfilter log (NFLOG) interface 48 []} {nfqueue Linux netfilter queue (NFQUEUE) interface 48 []} {usbmon0 Raw USB traffic, all USB buses 48 []} {usbmon1 Raw USB traffic, bus number 1 0 []} {usbmon2 Raw USB traffic, bus number 2 0 []} {usbmon3 Raw USB traffic, bus number 3 0 []} {usbmon4 Raw USB traffic, bus number 4 0 []}]
2024/08/23 09:43:56 [DEBUG] device name is not match: eno1 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: veth8eb5be8 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: vethae1cc68 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: br-73c2da7e490e != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: vethaf86800 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: veth6537756 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: lo != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: any != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: docker0 != eno2
2024/08/23 09:43:56 [DEBUG] getGatewayMac: eno2 192.168.10.8
2024/08/23 09:43:57 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2024/08/23 09:43:58 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2024/08/23 09:43:59 [DEBUG] fetch mac address timeout: eno2
2024/08/23 09:43:59 ReadPacketData error: EOF
2024/08/23 09:43:59 [DEBUG] close pcap handler for getGatewayMac
2024/08/23 09:43:59 [DEBUG] fetch gateway mac failed: eno2
2024/08/23 09:43:59 select adapter of to send packets: &{eno2 192.168.100.1 [] {192.168.100.1 ffffff00} ffffff00 ac:1f:6b:b5:48:e9 }
2024/08/23 09:43:59 routine-recv start
2024/08/23 09:43:59 port scanner is ready
2024/08/23 09:43:59 routine-target run out ping target pool 2
2024/08/23 09:43:59 alive range after ping2 (1): 192.168.10.8
2024/08/23 09:43:59 start first round ARP
2024/08/23 09:43:59 first round ARP done
2024/08/23 09:44:00 4.114s 0/91 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/08/23 09:44:00 start sending packets
2024/08/23 09:44:00 [WARNING] can not determine dst mac of packet for 192.168.10.8
2024/08/23 09:44:00 routine-target is about to exit since target pool is running out
2024/08/23 09:44:00 routine-target is exit since target pool and retry pool is running out
2024/08/23 09:44:00 not start another round ARP
2024/08/23 09:44:00 routine-send out
2024/08/23 09:44:01 GrabScannerStatistics: {0 0 0 1}
2024/08/23 09:44:01 AppScannerStatistics: {0 0 0 1}
2024/08/23 09:44:01 SendPacketCount: 91 91
2024/08/23 09:44:01 5.114s 91/91 (100.00% 0s left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/08/23 09:44:01 routine-status is exit since scan is done
2024/08/23 09:44:06 BasicNetworkInfoScanner out...
2024/08/23 09:44:10 close pcap sender
2024/08/23 09:44:10 routine-recv out
2024/08/23 09:44:11 routine-pcap-sender is exit
2024/08/23 09:44:11 done: 15.178s 91/91 (100.00%) send: 0; recv: 0
2024/08/23 09:44:11 PortScanner out...
2024/08/23 09:44:16 GrabScanner out...
2024/08/23 09:44:16 AppScanner out...
2024/08/23 09:44:16 no need to scan vulnerabilities, cause not any ip assets
2024/08/23 09:44:16 scan task all finished, now out!
2024/08/23 09:43:56 192.168.10.97:56164 POST /api/v1/startScan} {fe80::2090:5e16:8170:add7 ffffffffffffffff0000000000000000 }]} {veth8eb5be8 22 [{fe80::a85b:bdff:feeb:de5b ffffffffffffffff0000000000000000 }]} {vethae1cc68 22 [{fe80::1cb6:a2ff:fe04:295c ffffffffffffffff0000000000000000 }]} {br-73c2da7e490e 22 [{172.21.0.1 ffff0000 172.21.255.255 } {fe80::42:2bff:feb9:78ea ffffffffffffffff0000000000000000 }]} {vethaf86800 22 [{fe80::b4d0:68ff:fee0:3a19 ffffffffffffffff0000000000000000 }]} {veth6537756 22 [{fe80::9c86:d0ff:fe67:e9f2 ffffffffffffffff0000000000000000 }]} {lo 55 [{127.0.0.1 ff000000 } {::1 ffffffffffffffffffffffffffffffff }]} {any Pseudo-device that captures on all interfaces 54 []} {docker0 34 [{172.17.0.1 ffff0000 172.17.255.255 }]} {eno2 34 [{192.168.100.1 ffffff00 192.168.100.255 } {fe80::fea:383c:a7b3:bedf ffffffffffffffff0000000000000000 }]} {nflog Linux netfilter log (NFLOG) interface 48 []} {nfqueue Linux netfilter queue (NFQUEUE) interface 48 []} {usbmon0 Raw USB traffic, all USB buses 48 []} {usbmon1 Raw USB traffic, bus number 1 0 []} {usbmon2 Raw USB traffic, bus number 2 0 []} {usbmon3 Raw USB traffic, bus number 3 0 []} {usbmon4 Raw USB traffic, bus number 4 0 []}]
2024/08/23 09:43:56 [DEBUG] device name is not match: eno1 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: veth8eb5be8 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: vethae1cc68 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: br-73c2da7e490e != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: vethaf86800 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: veth6537756 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: lo != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: any != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: docker0 != eno2
2024/08/23 09:43:56 [DEBUG] getGatewayMac: eno2 192.168.10.8
2024/08/23 09:43:57 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2024/08/23 09:43:58 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2024/08/23 09:43:59 [DEBUG] fetch mac address timeout: eno2
2024/08/23 09:43:59 ReadPacketData error: EOF
2024/08/23 09:43:59 [DEBUG] close pcap handler for getGatewayMac
2024/08/23 09:43:59 [DEBUG] fetch gateway mac failed: eno2
2024/08/23 09:43:59 select adapter of to send packets: &{eno2 192.168.100.1 [] {192.168.100.1 ffffff00} ffffff00 ac:1f:6b:b5:48:e9 }
2024/08/23 09:43:59 routine-recv start
2024/08/23 09:43:59 port scanner is ready
2024/08/23 09:43:59 routine-target run out ping target pool 2
2024/08/23 09:43:59 alive range after ping2 (1): 192.168.10.8
2024/08/23 09:43:59 start first round ARP
2024/08/23 09:43:59 first round ARP done
2024/08/23 09:44:00 4.114s 0/91 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/08/23 09:44:00 start sending packets
2024/08/23 09:44:00 [WARNING] can not determine dst mac of packet for 192.168.10.8
2024/08/23 09:44:00 routine-target is about to exit since target pool is running out
2024/08/23 09:44:00 routine-target is exit since target pool and retry pool is running out
2024/08/23 09:44:00 not start another round ARP
2024/08/23 09:44:00 routine-send out
2024/08/23 09:44:01 GrabScannerStatistics: {0 0 0 1}
2024/08/23 09:44:01 AppScannerStatistics: {0 0 0 1}
2024/08/23 09:44:01 SendPacketCount: 91 91
2024/08/23 09:44:01 5.114s 91/91 (100.00% 0s left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/08/23 09:44:01 routine-status is exit since scan is done
2024/08/23 09:44:06 BasicNetworkInfoScanner out...
2024/08/23 09:44:10 close pcap sender
2024/08/23 09:44:10 routine-recv out
2024/08/23 09:44:11 routine-pcap-sender is exit
2024/08/23 09:44:11 done: 15.178s 91/91 (100.00%) send: 0; recv: 0
2024/08/23 09:44:11 PortScanner out...
2024/08/23 09:44:16 GrabScanner out...
2024/08/23 09:44:16 AppScanner out...
2024/08/23 09:44:16 no need to scan vulnerabilities, cause not any ip assets
2024/08/23 09:44:16 scan task all finished, now out!
2024/08/23 09:43:56 [WARNING] change deep-analysis feature is not included in your current license. 2024/08/23 09:43:56 goby.Start.LoadCustomRules() err: open /home/programs/goby/goby-linux-x64-2.5.2/golib/rules/user/cdn-header-rule.json: no such file or directory 2024/08/23 09:43:56 goby_config BlackTargets: 2024/08/23 09:43:56 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.10.8 2024/08/23 09:43:56 start port scanner: totalSize: 91, rate: 1000, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1724377436583961984, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2 2024/08/23 09:43:56 pcap version: libpcap version 1.9.1 (with TPACKET_V3) 2024/08/23 09:43:56 found device from route table for 192.168.10.8: eno2 2024/08/23 09:43:56 [DEBUG] get adapter of device eno2 2024/08/23 09:43:56 [DEBUG] devices: [{eno1 22 [{192.168.11.241 ffffff00 192.168.11.255