xray icon indicating copy to clipboard operation
xray copied to clipboard

dnslog

Open sp1r1tt opened this issue 1 year ago • 2 comments

[WRN] 24-09-09 11:00:12 go load fail: go-poc-weaver-e-cology-oa-sql_injection-CT-787974.go.bin: go-poc-weaver-e-cology-oa-sql_injection-CT-787974.go.bin:26:5: variable definition loop [loader_go.go:88] [INF] 24-09-09 11:00:12 使用以下位置的配置文件:C:\Users\awdwqf.xray\xpoc\xpoc-config.yaml [app.go:447] [INF] 24-09-09 11:00:12 poc:reverse-registry: 默认反连不可用 原因: 没有配置默认反连 [registry.go:13] [INF] 24-09-09 11:00:14 poc:reverse-client-dnslog: DNSLOG.CN不可用 原因: Get "http://dnslog.cn/getdomain.php": dial tcp: lookup dnslog.cn: getaddrinfow: This is usually a temporary error during hostname resolution and means that the local server did not receive a response from an authoritative server. [dnslogcn.go:39] [INF] 24-09-09 11:00:14 poc:reverse-client-new: 新反连客户端不可用 原因: 没有开启新反连平台 [client.go:18] [WRN] 24-09-09 11:00:29 poc:detect-url: Get "https://testphp.vulnweb.com/listproducts.php?cat=1": context deadline exceeded [url.go:93] [ERR] 24-09-09 11:00:34 poc:detect-url: context deadline exceeded [url.go:96] [ERR] 24-09-09 11:00:34 poc:reverse-client-dnslog: panic: interface conversion: reverse.ClientIface is nil, not *reverse.DNSLogCNClient [dnslogcn.go:31]

Hello! Am I tired of this error already, how to disable this connection? I think the old xray worked better

sp1r1tt avatar Sep 09 '24 08:09 sp1r1tt

everything is ok! I think I figured it out, although it doesn't detect any vulnerabilities on http://testphp.vulnweb.com/ .. But I just decided to use the old method and run xray and all work good

sp1r1tt avatar Sep 09 '24 11:09 sp1r1tt

hello

--disable reverse-client-dnslog

4ra1n avatar Dec 26 '24 03:12 4ra1n