projectdiscovery / naabu

A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
https://projectdiscovery.io
MIT License
4.59k stars 538 forks source link

-rate is breaking the script without result #1075

Closed 0xM4r5h4l closed 3 months ago

0xM4r5h4l commented 3 months ago

Naabu version: 2.3.1

Current Behavior: when i run naabu with -rate the script does not return any results

Expected Behavior: it should return scan result

Steps To Reproduce:

  1. Run 'naabu -p 0-65535 -rate 2000 -host '
  2. Script stops without any result
    
    [INF] Current naabu version 2.3.1 (latest)
    [INF] Running host discovery scan
    [INF] Running SYN scan with CAP_NET_RAW privileges


### Anything else:
note: i tried the command on multiple hosts
<!-- Links? References? Screnshots? Anything that will give us more context about the issue that you are encountering! -->
dogancanbakir commented 3 months ago

Couldn't repro the issue.

$ ./naabu -p 0-65535 -rate 2000 -host target.com

                  __
  ___  ___  ___ _/ /  __ __
 / _ \/ _ \/ _ \/ _ \/ // /
/_//_/\_,_/\_,_/_.__/\_,_/

                projectdiscovery.io

[INF] Current naabu version 2.3.1 (latest)
[INF] Running CONNECT scan with non root privileges
target.com:21
target.com:2052
target.com:80
...

$ sudo ./naabu -p 0-65535 -rate 2000 -host target.com

                  __
  ___  ___  ___ _/ /  __ __
 / _ \/ _ \/ _ \/ _ \/ // /
/_//_/\_,_/\_,_/_.__/\_,_/

                projectdiscovery.io

[INF] Current naabu version 2.3.1 (latest)
[INF] Running SYN scan with root privileges
target.com:2086
...
dogancanbakir commented 3 months ago

Closing this. Feel free to reopen if the issue persists.