Goby
Goby copied to clipboard
未知错误,无法进行扫描
发生未知错误,Goby 将尝试重启解决。若重启后错误仍存在,请反馈给我们。 Github issue
错误详情: Error 2024/02/16 09:20:22 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2024/02/16 09:20:22 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2024/02/16 09:20:22 auto-select the fastest DNS server: 1.1.1.1:53 0s 2024/02/16 09:20:22 init repleace log regex len: 3 2024/02/16 09:20:22 Grab version: grab_version_1.9.1.0 2024/02/16 09:20:22 Support 347 protocols, 807 ports 2024/02/16 09:20:23 [DEBUG] runtime.NumCPU():8, runtime.GOMAXPROCS():6 2024/02/16 09:20:23 try to load user products rules: D:\goby-win-x64-2.8.9\golib\rules\user\rule.json 2024/02/16 09:20:23 read user rule file ok: 0 2024/02/16 09:20:23 load json dir D:\goby-win-x64-2.8.9\golib\c48cdbbeec620ea4 error: CreateFile D:\goby-win-x64-2.8.9\golib\c48cdbbeec620ea4: The system cannot find the file specified. 2024/02/16 09:20:23 load archive dir D:\goby-win-x64-2.8.9\golib\c48cdbbeec620ea4 error: open D:\goby-win-x64-2.8.9\golib\c48cdbbeec620ea4: The system cannot find the file specified. 2024/02/16 09:20:23 Version: v2.8.9 beta 2024/02/16 09:20:23 BuildTime: 2024-01-24 20:16:16 2024/02/16 09:20:23 load poc D:\goby-win-x64-2.8.9\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors) 2024/02/16 09:20:23 load poc D:\goby-win-x64-2.8.9\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to 2024/02/16 09:20:23 [WARNING] ParseString error: 1 error(s) decoding:
- 'Request.Header' expected a map, got 'slice' 2024/02/16 09:20:23 [WARNING] ParseString error: 1 error(s) decoding:
- 'Request.Header' expected a map, got 'slice'
2024/02/16 09:20:23 564
POCwere successfully loaded 2024/02/16 09:20:25 API Server listen at 127.0.0.1:8361 2024/02/16 09:20:25 pcap version: Npcap version 1.75, based on libpcap version 1.10.4 2024/02/16 09:20:25 127.0.0.1:39281 POST /api/v1/setEnvi 2024/02/16 09:20:25 127.0.0.1:39282 POST /api/v1/setEnvi 2024/02/16 09:20:25 found device from route table for 8.8.8.8: \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] get adapter of device \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] devices: [{\Device\NPF_{9F8F8ABA-F3F1-4E7D-BF13-A7EE17807839} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{F1256575-E699-4069-9D4D-DF657A89E89B} WAN Miniport (IPv6) 22 []} {\Device\NPF_{886747A6-7C57-4981-A359-96BFA5270569} WAN Miniport (IP) 22 []} {\Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} Intel(R) Dual Band Wireless-AC 8265 30 [{192.168.1.4 ffffff00 192.168.1.255} {fe80::e59b:26be:ec88:80ed ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {2409:8a55:3135:6b10:83a:4040:dc63:f955 ffffffffffffffffffffffffffffffff 2409:8a55:3135:6b10:83a:4040:dc63:f955 } {2409:8a55:3135:6b10:fed6:2f6e:e673:967c ffffffffffffffff0000000000000000 2409:8a55:3135:6b10:ffff:ffff:ffff:ffff }]} {\Device\NPF_{02D5849E-FE1A-45C5-BFC4-934152106237} VMware Virtual Ethernet Adapter for VMnet8 22 [{192.168.213.1 ffffff00 192.168.213.255 } {fe80::44b:e66:fe01:9e0 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{EDA105A0-FA7C-4ADA-AE43-A238468DD256} VMware Virtual Ethernet Adapter for VMnet1 22 [{192.168.181.1 ffffff00 192.168.181.255 } {fe80::ea59:5ee7:8239:df80 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{F32DA408-A475-42CD-A54C-6E12533F4A02} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.173.6 ffff0000 169.254.255.255 } {fe80::8ace:88b3:732f:3d33 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{1943BC21-EC2A-4722-9108-D90983B96883} Microsoft Wi-Fi Direct Virtual Adapter 46 [{169.254.62.10 ffff0000 169.254.255.255 } {fe80::d790:c8a2:c761:65e5 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} Clash Tunnel 22 [{198.18.0.1 ffff0000 198.18.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{1ABA0E1D-E282-4491-B719-27DC418B33F3} Intel(R) Ethernet Connection (4) I219-V 38 [{169.254.60.135 ffff0000 169.254.255.255 } {fe80::6a57:a54e:b131:bebd ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2024/02/16 09:20:25 [DEBUG] device name is not match: \Device\NPF_{9F8F8ABA-F3F1-4E7D-BF13-A7EE17807839} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] device name is not match: \Device\NPF_{F1256575-E699-4069-9D4D-DF657A89E89B} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] device name is not match: \Device\NPF_{886747A6-7C57-4981-A359-96BFA5270569} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] device name is not match: \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] device name is not match: \Device\NPF_{02D5849E-FE1A-45C5-BFC4-934152106237} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] device name is not match: \Device\NPF_{EDA105A0-FA7C-4ADA-AE43-A238468DD256} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] device name is not match: \Device\NPF_{F32DA408-A475-42CD-A54C-6E12533F4A02} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] device name is not match: \Device\NPF_{1943BC21-EC2A-4722-9108-D90983B96883} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:25 [DEBUG] getGatewayMac: \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 8.8.8.8 2024/02/16 09:20:26 127.0.0.1:39287 GET /api/v1/getEnvi?field=ip 2024/02/16 09:20:26 127.0.0.1:39286 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion 2024/02/16 09:20:26 127.0.0.1:39288 GET /api/v1/getEnvi?field=gid,key,godserver 2024/02/16 09:20:26 127.0.0.1:39289 POST /api/v1/getPOCList 2024/02/16 09:20:26 127.0.0.1:39292 POST /api/v1/getTasks 2024/02/16 09:20:26 load poc D:\goby-win-x64-2.8.9\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors) 2024/02/16 09:20:26 127.0.0.1:39297 GET /api/v1/getEnvi?field=licenseInfo,midKey 2024/02/16 09:20:26 find router mac is 45:00:00:1f:b8:82 2024/02/16 09:20:26 127.0.0.1:39302 GET /api/v1/live 2024/02/16 09:20:27 load poc D:\goby-win-x64-2.8.9\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to 2024/02/16 09:20:27 [WARNING] ParseString error: 1 error(s) decoding: - 'Request.Header' expected a map, got 'slice' 2024/02/16 09:20:27 [WARNING] ParseString error: 1 error(s) decoding:
- 'Request.Header' expected a map, got 'slice'
2024/02/16 09:20:27 [DEBUG] get adapter of device \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D}
2024/02/16 09:20:27 [DEBUG] devices: [{\Device\NPF_{9F8F8ABA-F3F1-4E7D-BF13-A7EE17807839} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{F1256575-E699-4069-9D4D-DF657A89E89B} WAN Miniport (IPv6) 22 []} {\Device\NPF_{886747A6-7C57-4981-A359-96BFA5270569} WAN Miniport (IP) 22 []} {\Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} Intel(R) Dual Band Wireless-AC 8265 30 [{192.168.1.4 ffffff00 192.168.1.255
} {fe80::e59b:26be:ec88:80ed ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {2409:8a55:3135:6b10:83a:4040:dc63:f955 ffffffffffffffffffffffffffffffff 2409:8a55:3135:6b10:83a:4040:dc63:f955 } {2409:8a55:3135:6b10:fed6:2f6e:e673:967c ffffffffffffffff0000000000000000 2409:8a55:3135:6b10:ffff:ffff:ffff:ffff }]} {\Device\NPF_{02D5849E-FE1A-45C5-BFC4-934152106237} VMware Virtual Ethernet Adapter for VMnet8 22 [{192.168.213.1 ffffff00 192.168.213.255 } {fe80::44b:e66:fe01:9e0 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{EDA105A0-FA7C-4ADA-AE43-A238468DD256} VMware Virtual Ethernet Adapter for VMnet1 22 [{192.168.181.1 ffffff00 192.168.181.255 } {fe80::ea59:5ee7:8239:df80 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{F32DA408-A475-42CD-A54C-6E12533F4A02} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.173.6 ffff0000 169.254.255.255 } {fe80::8ace:88b3:732f:3d33 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{1943BC21-EC2A-4722-9108-D90983B96883} Microsoft Wi-Fi Direct Virtual Adapter 46 [{169.254.62.10 ffff0000 169.254.255.255 } {fe80::d790:c8a2:c761:65e5 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} Clash Tunnel 22 [{198.18.0.1 ffff0000 198.18.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{1ABA0E1D-E282-4491-B719-27DC418B33F3} Intel(R) Ethernet Connection (4) I219-V 38 [{169.254.60.135 ffff0000 169.254.255.255 } {fe80::6a57:a54e:b131:bebd ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2024/02/16 09:20:27 [DEBUG] device name is not match: \Device\NPF_{9F8F8ABA-F3F1-4E7D-BF13-A7EE17807839} != \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} 2024/02/16 09:20:27 [DEBUG] device name is not match: \Device\NPF_{F1256575-E699-4069-9D4D-DF657A89E89B} != \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} 2024/02/16 09:20:27 [DEBUG] device name is not match: \Device\NPF_{886747A6-7C57-4981-A359-96BFA5270569} != \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} 2024/02/16 09:20:27 [DEBUG] getGatewayMac: \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} 0.0.0.0 2024/02/16 09:20:27 [DEBUG] fetch mac address: \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 45:00:00:1f:b8:82 2024/02/16 09:20:27 [DEBUG] close pcap handler for getGatewayMac 2024/02/16 09:20:27 select adapter of to send packets: &{\Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 198.18.0.1 [] {198.18.0.1 ffff0000} ffff0000 Clash Tunnel 45:00:00:1f:b8:82} 2024/02/16 09:20:29 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired 2024/02/16 09:20:30 [DEBUG] fetch mac address timeout: \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} 2024/02/16 09:20:30 ReadPacketData error: EOF 2024/02/16 09:20:30 [DEBUG] close pcap handler for getGatewayMac 2024/02/16 09:20:30 [DEBUG] fetch gateway mac failed: \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} 2024/02/16 09:20:36 127.0.0.1:39316 POST /api/v1/getPOCList 2024/02/16 09:20:36 load poc D:\goby-win-x64-2.8.9\golib\exploits\user\Apache Solr Log4j JNDI RCE.go error: _.go:98:8: illegal character U+FF1A ':' (and 1 more errors) 2024/02/16 09:20:36 load poc D:\goby-win-x64-2.8.9\golib\exploits\user\Panabit_Panalog_cmdhandle.php_backstage_RCE.go error: 99:12: not enough arguments in call to 2024/02/16 09:20:36 [WARNING] ParseString error: 1 error(s) decoding: - 'Request.Header' expected a map, got 'slice' 2024/02/16 09:20:36 [WARNING] ParseString error: 1 error(s) decoding:
- 'Request.Header' expected a map, got 'slice'
2024/02/16 09:20:40 127.0.0.1:39319 POST /api/v1/startScan
2024/02/16 09:20:40 [WARNING] change deep-analysis feature is not included in your current license.
2024/02/16 09:20:40 goby.Start.LoadCustomRules() err: open D:\goby-win-x64-2.8.9\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified.
2024/02/16 09:20:40 goby_config BlackTargets:
2024/02/16 09:20:40 scan 1,7,9,13,19,21-23,25,37,42,49,53,69,79-81,85,105,109-111,113,123,135,137-139,143,161,179,222,264,384,389,402,407,443-446,465,500,502,512-515,523-524,540,548,554,587,617,623,689,705,771,783,873,888,902,910,912,921,993,995,998,1000,1024,1030,1035,1090,1098-1103,1128-1129,1158,1199,1211,1220,1234,1241,1300,1311,1352,1433-1435,1440,1494,1521,1530,1533,1581-1582,1604,1720,1723,1755,1811,1900,2000-2001,2049,2082,2083,2100,2103,2121,2199,2207,2222,2323,2362,2375,2380-2381,2525,2533,2598,2601,2604,2638,2809,2947,2967,3000,3037,3050,3057,3128,3200,3217,3273,3299,3306,3311,3312,3389,3460,3500,3628,3632,3690,3780,3790,3817,4000,4322,4433,4444-4445,4659,4679,4848,5000,5038,5040,5051,5060-5061,5093,5168,5247,5250,5351,5353,5355,5400,5405,5432-5433,5498,5520-5521,5554-5555,5560,5580,5601,5631-5632,5666,5800,5814,5900-5910,5920,5984-5986,6000,6050,6060,6070,6080,6082,6101,6106,6112,6262,6379,6405,6502-6504,6542,6660-6661,6667,6905,6988,7001,7021,7071,7080,7144,7181,7210,7443,7510,7579-7580,7700,7770,7777-7778,7787,7800-7801,7879,7902,8000-8001,8008,8014,8020,8023,8028,8030,8080-8082,8087,8090,8095,8161,8180,8205,8222,8300,8303,8333,8400,8443-8444,8503,8800,8812,8834,8880,8888-8890,8899,8901-8903,9000,9002,9060,9080-9081,9084,9090,9099-9099,9111,9152,9200,9390-9391,9443,9495,9809-9815,9855,9999-10001,10008,10050-10051,10080,10098,10162,10202-10203,10443,10616,10628,11000,11099,11211,11234,11333,12174,12203,12221,12345,12397,12401,13364,13500,13838,14330,15200,16102,17185,17200,18881,19300,19810,20010,20031,20034,20101,20111,20171,20222,22222,23472,23791,23943,25000,25025,26000,26122,27000,27017,27888,28222,28784,30000,30718,31001,31099,32764,32913,34205,34443,37718,38080,38292,40007,41025,41080,41523-41524,44334,44818,45230,46823-46824,47001-47002,48899,49152,50000-50004,50013,50500-50504,52302,55553,57772,62078,62514,65535 192.168.1.0/24
2024/02/16 09:20:40 JumpDefend has been enabled and will automatically configure the HTTP interceptor.
2024/02/16 09:20:40 start port scanner: totalSize: 103424, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1708046440153968000, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2
2024/02/16 09:20:40 pcap version: Npcap version 1.75, based on libpcap version 1.10.4
2024/02/16 09:20:40 found device from route table for 192.168.1.255: \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4}
2024/02/16 09:20:40 [DEBUG] get adapter of device \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4}
2024/02/16 09:20:40 [DEBUG] devices: [{\Device\NPF_{9F8F8ABA-F3F1-4E7D-BF13-A7EE17807839} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{F1256575-E699-4069-9D4D-DF657A89E89B} WAN Miniport (IPv6) 22 []} {\Device\NPF_{886747A6-7C57-4981-A359-96BFA5270569} WAN Miniport (IP) 22 []} {\Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} Intel(R) Dual Band Wireless-AC 8265 30 [{192.168.1.4 ffffff00 192.168.1.255
} {fe80::e59b:26be:ec88:80ed ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {2409:8a55:3135:6b10:83a:4040:dc63:f955 ffffffffffffffffffffffffffffffff 2409:8a55:3135:6b10:83a:4040:dc63:f955 } {2409:8a55:3135:6b10:fed6:2f6e:e673:967c ffffffffffffffff0000000000000000 2409:8a55:3135:6b10:ffff:ffff:ffff:ffff }]} {\Device\NPF_{02D5849E-FE1A-45C5-BFC4-934152106237} VMware Virtual Ethernet Adapter for VMnet8 22 [{192.168.213.1 ffffff00 192.168.213.255 } {fe80::44b:e66:fe01:9e0 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{EDA105A0-FA7C-4ADA-AE43-A238468DD256} VMware Virtual Ethernet Adapter for VMnet1 22 [{192.168.181.1 ffffff00 192.168.181.255 } {fe80::ea59:5ee7:8239:df80 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{F32DA408-A475-42CD-A54C-6E12533F4A02} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.173.6 ffff0000 169.254.255.255 } {fe80::8ace:88b3:732f:3d33 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{1943BC21-EC2A-4722-9108-D90983B96883} Microsoft Wi-Fi Direct Virtual Adapter 46 [{169.254.62.10 ffff0000 169.254.255.255 } {fe80::d790:c8a2:c761:65e5 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} Clash Tunnel 22 [{198.18.0.1 ffff0000 198.18.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{1ABA0E1D-E282-4491-B719-27DC418B33F3} Intel(R) Ethernet Connection (4) I219-V 38 [{169.254.60.135 ffff0000 169.254.255.255 } {fe80::6a57:a54e:b131:bebd ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}] 2024/02/16 09:20:40 [DEBUG] device name is not match: \Device\NPF_{9F8F8ABA-F3F1-4E7D-BF13-A7EE17807839} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:40 [DEBUG] device name is not match: \Device\NPF_{F1256575-E699-4069-9D4D-DF657A89E89B} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:40 [DEBUG] device name is not match: \Device\NPF_{886747A6-7C57-4981-A359-96BFA5270569} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:40 [DEBUG] device name is not match: \Device\NPF_{25E895CA-7B27-42B3-A7F5-573DE052981D} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:40 [DEBUG] device name is not match: \Device\NPF_{02D5849E-FE1A-45C5-BFC4-934152106237} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:40 [DEBUG] device name is not match: \Device\NPF_{EDA105A0-FA7C-4ADA-AE43-A238468DD256} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:40 [DEBUG] device name is not match: \Device\NPF_{F32DA408-A475-42CD-A54C-6E12533F4A02} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:40 [DEBUG] device name is not match: \Device\NPF_{1943BC21-EC2A-4722-9108-D90983B96883} != \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 2024/02/16 09:20:40 [DEBUG] getGatewayMac: \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 192.168.1.255 2024/02/16 09:20:40 127.0.0.1:39321 POST /api/v1/setEnvi 2024/02/16 09:20:40 127.0.0.1:39322 POST /api/v1/getProgress 2024/02/16 09:20:40 127.0.0.1:39323 POST /api/v1/getStatisticsData 2024/02/16 09:20:41 find router mac is 45:00:00:1f:b8:87 2024/02/16 09:20:42 [DEBUG] fetch mac address: \Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 45:00:00:1f:b8:87 2024/02/16 09:20:42 [DEBUG] close pcap handler for getGatewayMac 2024/02/16 09:20:42 select adapter of to send packets: &{\Device\NPF_{44393EFC-29C4-25E4-B684-F168B398A2B4} 198.18.0.1 [] {198.18.0.1 ffff0000} ffff0000 Clash Tunnel 45:00:00:1f:b8:87} 2024/02/16 09:20:42 routine-recv start 2024/02/16 09:20:42 port scanner is ready 2024/02/16 09:20:42 routine-target run out ping target pool 2 2024/02/16 09:20:42 alive range after ping2 (256): 192.168.1.0-192.168.1.255 2024/02/16 09:20:42 start first round ARP 2024/02/16 09:20:42 first round ARP done 2024/02/16 09:20:43 3.347s 0/103424 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2024/02/16 09:20:43 127.0.0.1:39326 POST /api/v1/getProgress 2024/02/16 09:20:43 127.0.0.1:39327 POST /api/v1/getStatisticsData 2024/02/16 09:20:43 start sending packets 2024/02/16 09:20:43 [WARNING] Serialize failed: invalid src MAC: 2024/02/16 09:20:43 routine-send out panic: runtime error: index out of range [0] with length 0 goroutine 104 [running]: github.com/google/gopacket/pcap.(*Handle).pcapSendpacket(0xc0103f0160?, {0x0?, 0x1f?, 0x0?}) github.com/google/[email protected]/pcap/pcap_windows.go:658 +0x6d github.com/google/gopacket/pcap.(*Handle).WritePacketData(...) github.com/google/[email protected]/pcap/pcap.go:696 git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).sendSYN(0xc00fa08750, 0xc0a8012c, 0x51f) git.gobies.org/goby/[email protected]/pcapsend/send.go:382 +0x192 git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).SendPackets(0xc00fa08750, {0x7ff7b1e5a420, 0xc00c8a3a90}, 0xc00c079ef0?, 0x2?, 0x2?) git.gobies.org/goby/[email protected]/pcapsend/send.go:1648 +0x77b created by git.gobies.org/goby/portscanner.(*PortScanner).startPcapScan in goroutine 40 git.gobies.org/goby/[email protected]/portscanner.go:219 +0x268
已经解决了,没想到goby竟然会和clash冲突
建议使用Socket模式~