dnslog
[WRN] 24-09-09 11:00:12 go load fail: go-poc-weaver-e-cology-oa-sql_injection-CT-787974.go.bin: go-poc-weaver-e-cology-oa-sql_injection-CT-787974.go.bin:26:5: variable definition loop [loader_go.go:88] [INF] 24-09-09 11:00:12 使用以下位置的配置文件:C:\Users\awdwqf.xray\xpoc\xpoc-config.yaml [app.go:447] [INF] 24-09-09 11:00:12 poc:reverse-registry: 默认反连不可用 原因: 没有配置默认反连 [registry.go:13] [INF] 24-09-09 11:00:14 poc:reverse-client-dnslog: DNSLOG.CN不可用 原因: Get "http://dnslog.cn/getdomain.php": dial tcp: lookup dnslog.cn: getaddrinfow: This is usually a temporary error during hostname resolution and means that the local server did not receive a response from an authoritative server. [dnslogcn.go:39] [INF] 24-09-09 11:00:14 poc:reverse-client-new: 新反连客户端不可用 原因: 没有开启新反连平台 [client.go:18] [WRN] 24-09-09 11:00:29 poc:detect-url: Get "https://testphp.vulnweb.com/listproducts.php?cat=1": context deadline exceeded [url.go:93] [ERR] 24-09-09 11:00:34 poc:detect-url: context deadline exceeded [url.go:96] [ERR] 24-09-09 11:00:34 poc:reverse-client-dnslog: panic: interface conversion: reverse.ClientIface is nil, not *reverse.DNSLogCNClient [dnslogcn.go:31]
Hello! Am I tired of this error already, how to disable this connection? I think the old xray worked better
everything is ok! I think I figured it out, although it doesn't detect any vulnerabilities on http://testphp.vulnweb.com/ .. But I just decided to use the old method and run xray and all work good
hello
--disable reverse-client-dnslog