2023/09/15 11:28:55 [DEBUG] runtime.NumCPU():12, runtime.GOMAXPROCS():10
2023/09/15 11:28:55 read user rule file ok: 0
2023/09/15 11:28:55 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0
2023/09/15 11:28:55 init repleace log regex len: 3
2023/09/15 11:28:55 Grab version: grab_version_1.9.1.0
2023/09/15 11:28:55 Support 344 protocols, 804 ports
2023/09/15 11:28:55 Version: v2.7.5
2023/09/15 11:28:55 init cdn check client: Get "https://cdn.nuclei.sh": read tcp 172.20.10.2:48527->172.66.40.212:443: wsarecv: An existing connection was forcibly closed by the remote host.
2023/09/15 11:28:57 API Server listen at 127.0.0.1:8361
2023/09/15 11:28:57 pcap version: Npcap version 1.75, based on libpcap version 1.10.4
2023/09/15 11:28:57 found device from route table for 8.8.8.8: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] get adapter of device \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] devices: [{\Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{172.20.10.2 fffffff0 172.20.10.15 }]} {\Device\NPF_{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF_{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 38 [{172.10.7.136 ffffff00 172.10.7.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}]
2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] getGatewayMac: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 8.8.8.8
2023/09/15 11:28:58 127.0.0.1:48661 GET /api/v1/live
2023/09/15 11:28:58 find router mac is 06:bc:6d:6b:cc:64
2023/09/15 11:28:59 127.0.0.1:48671 POST /api/v1/setEnvi
2023/09/15 11:28:59 [DEBUG] fetch mac address: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 06:bc:6d:6b:cc:64
2023/09/15 11:28:59 [DEBUG] close pcap handler for getGatewayMac
2023/09/15 11:28:59 select adapter of to send packets: &{\Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 172.20.10.2 [] {172.20.10.2 fffffff0} fffffff0 24:41:8c:f9:1a:05 Intel(R) Wi-Fi 6 AX200 160MHz 06:bc:6d:6b:cc:64}
2023/09/15 11:28:59 127.0.0.1:48674 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion
2023/09/15 11:28:59 127.0.0.1:48675 GET /api/v1/getEnvi?field=ip
2023/09/15 11:28:59 127.0.0.1:48676 GET /api/v1/getEnvi?field=gid,key,godserver
2023/09/15 11:28:59 127.0.0.1:48677 POST /api/v1/getPOCList
2023/09/15 11:28:59 127.0.0.1:48678 POST /api/v1/getTasks
2023/09/15 11:29:00 127.0.0.1:48680 GET /api/v1/getEnvi?field=licenseInfo,midKey
2023/09/15 11:29:00 [DEBUG] get adapter of device \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] devices: [{\Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{172.20.10.2 fffffff0 172.20.10.15 }]} {\Device\NPF_{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF_{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 38 [{172.10.7.136 ffffff00 172.10.7.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}]
2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] getGatewayMac: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 0.0.0.0
2023/09/15 11:29:00 auto-select the fastest DNS server: 223.6.6.6:53 36.53595ms
2023/09/15 11:29:01 find router mac is 06:bc:6d:6b:cc:64
2023/09/15 11:29:01 [DEBUG] fetch mac address: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 06:bc:6d:6b:cc:64
2023/09/15 11:29:01 [DEBUG] close pcap handler for getGatewayMac
2023/09/15 11:43:23 127.0.0.1:9409 GET /api/v1/listAdapters
2023/09/15 11:43:31 127.0.0.1:9440 POST /api/v1/setEnvi
2023/09/15 11:43:35 127.0.0.1:9451 POST /api/v1/setEnvi
2023/09/15 11:43:36 127.0.0.1:9455 POST /api/v1/getTasks
2023/09/15 11:43:38 127.0.0.1:9466 POST /api/v1/getStatisticsData
2023/09/15 11:43:39 127.0.0.1:9468 POST /api/v1/resumeScan
2023/09/15 11:43:39 goby.Start.LoadCustomRules() err: open D:\goby-win-x64-2.7.5-Community\goby-win-x64-2.7.5\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified.
2023/09/15 11:43:39 goby_config BlackTargets:
2023/09/15 11:43:39 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 10.11.64.115
2023/09/15 11:43:39 start port scanner: totalSize: 90, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1694746111357905100, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 0
2023/09/15 11:43:39 pcap version: Npcap version 1.75, based on libpcap version 1.10.4
2023/09/15 11:43:39 [DEBUG] get adapter of device \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 127.0.0.1:9469 POST /api/v1/getProgress
2023/09/15 11:43:39 [DEBUG] devices: [{\Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{192.168.137.149 ffffff00 192.168.137.255 }]} {\Device\NPF_{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF_{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 22 [{169.254.158.132 ffff0000 169.254.255.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}]
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{DB5D23C4-6264-4DFF-8D52-C395D62210C0} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] getGatewayMac: \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 10.11.64.115
2023/09/15 11:43:40 find router mac is 45:00:00:1f:55:dc
2023/09/15 11:43:41 [DEBUG] fetch mac address: \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 45:00:00:1f:55:dc
2023/09/15 11:43:41 [DEBUG] close pcap handler for getGatewayMac
2023/09/15 11:43:41 select adapter of to send packets: &{\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2.0.0.1 [] {2.0.0.1 ffffff00} ffffff00 aTrust Tunnel 45:00:00:1f:55:dc}
2023/09/15 11:43:41 routine-recv start
2023/09/15 11:43:41 port scanner is ready
2023/09/15 11:43:41 start first round ARP
2023/09/15 11:43:41 first round ARP done
2023/09/15 11:43:42 127.0.0.1:9487 POST /api/v1/getStatisticsData
2023/09/15 11:43:42 127.0.0.1:9486 POST /api/v1/getProgress
2023/09/15 11:43:42 3.157s 0/90 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2023/09/15 11:43:42 start sending packets
2023/09/15 11:43:42 [WARNING] Serialize failed: invalid src MAC:
2023/09/15 11:43:42 routine-send out
panic: runtime error: index out of range [0] with length 0
goroutine 156 [running]:
github.com/google/gopacket/pcap.(*Handle).pcapSendpacket(0xc001fdf1a0?, {0x0?, 0x1f?, 0x0?})
github.com/google/[email protected]/pcap/pcap_windows.go:658 +0x76
github.com/google/gopacket/pcap.(*Handle).WritePacketData(...)
github.com/google/[email protected]/pcap/pcap.go:696
git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).sendUDP(0xc008116750, 0xa0b4073, 0x8438)
git.gobies.org/goby/[email protected]/pcapsend/send.go:1165 +0x20f
git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).SendPackets(0xc008116750, {0x326e090, 0xc006ad8400}, 0x0?, 0x0?, 0x0?)
git.gobies.org/goby/[email protected]/pcapsend/send.go:1676 +0x74a
created by git.gobies.org/goby/portscanner.(*PortScanner).startPcapScan
git.gobies.org/goby/[email protected]/portscanner.go:219 +0x28a