Goby icon indicating copy to clipboard operation
Goby copied to clipboard

未知错误

Open WOWNTT123 opened this issue 1 year ago • 1 comments

2023/10/19 20:39:52 [DEBUG] runtime.NumCPU():4, runtime.GOMAXPROCS():2 2023/10/19 20:39:52 try to load user products rules: C:\Users\Administrator\Desktop\k8\goby-win-x64-2.7.7\golib\rules\user\rule.json 2023/10/19 20:39:52 read user rule file ok: 0 2023/10/19 20:39:52 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0 2023/10/19 20:39:52 init repleace log regex len: 3 2023/10/19 20:39:52 Grab version: grab_version_1.9.1.0 2023/10/19 20:39:52 Support 344 protocols, 804 ports 2023/10/19 20:39:52 Version: v2.7.7 2023/10/19 20:39:52 LicenseName: redteam 2023/10/19 20:39:54 API Server listen at 127.0.0.1:8361 2023/10/19 20:39:54 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2023/10/19 20:39:54 127.0.0.1:60904 GET /api/v1/live 2023/10/19 20:39:55 found device from route table for 8.8.8.8: \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:55 [DEBUG] get adapter of device \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:55 [DEBUG] devices: [{\Device\NPF_{B0025A7B-A06D-4EF9-9B24-EDCAC1AB5A07} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{2E00AA30-BFFE-4CCC-8F3A-D0BCF4A27924} WAN Miniport (IPv6) 22 []} {\Device\NPF_{57E4D8D8-3C02-4654-A9F1-2C0D6EB78E4F} WAN Miniport (IP) 22 []} {\Device\NPF_{90F8DD8B-75D1-4037-BF5E-20F1558FA498} Realtek PCIe GbE Family Controller #2 22 [{fd00:6868:6868::47a ffffffffffffffffffffffffffffffff fd00:6868:6868::47a } {fd00:6868:6868:0:44f:7a23:67aa:e621 ffffffffffffffff0000000000000000 fd00:6868:6868:0:ffff:ffff:ffff:ffff } {fd00:6868:6868:0:40a7:17b1:f6e5:2279 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:40a7:17b1:f6e5:2279 } {fd00:6868:6868:0:8490:2c6e:ebcd:28a9 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:8490:2c6e:ebcd:28a9 } {fd00:6868:6868:0:cd2c:5036:198b:5333 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:cd2c:5036:198b:5333 } {fe80::af11:8c47:ee44:ebfc ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.2.219 ffffff00 192.168.2.255 }]} {\Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} Meta Tunnel 22 [{fe80::ac30:1ae6:f91f:95e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {198.18.0.1 fffffffc 198.18.0.3 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{BD3BE26B-505C-4259-91DB-0D4C0FD43E80} Realtek PCIe GbE Family Controller 38 [{fe80::5025:bff6:a6aa:4f4c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.110.52 ffff0000 169.254.255.255 }]}] 2023/10/19 20:39:55 [DEBUG] device name is not match: \Device\NPF_{B0025A7B-A06D-4EF9-9B24-EDCAC1AB5A07} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:55 [DEBUG] device name is not match: \Device\NPF_{2E00AA30-BFFE-4CCC-8F3A-D0BCF4A27924} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:55 [DEBUG] device name is not match: \Device\NPF_{57E4D8D8-3C02-4654-A9F1-2C0D6EB78E4F} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:55 [DEBUG] device name is not match: \Device\NPF_{90F8DD8B-75D1-4037-BF5E-20F1558FA498} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:55 [DEBUG] getGatewayMac: \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 8.8.8.8 2023/10/19 20:39:56 find router mac is 45:00:00:1f:84:64 2023/10/19 20:39:56 127.0.0.1:60912 POST /api/v1/setEnvi 2023/10/19 20:39:56 127.0.0.1:60913 POST /api/v1/setEnvi 2023/10/19 20:39:57 [DEBUG] fetch mac address: \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 45:00:00:1f:84:64 2023/10/19 20:39:57 [DEBUG] close pcap handler for getGatewayMac 2023/10/19 20:39:57 select adapter of to send packets: &{\Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 198.18.0.1 [fe80::ac30:1ae6:f91f:95e] {198.18.0.1 fffffffc} fffffffc Meta Tunnel 45:00:00:1f:84:64} 2023/10/19 20:39:57 127.0.0.1:60917 POST /api/v1/getPOCList 2023/10/19 20:39:57 127.0.0.1:60916 GET /api/v1/getEnvi?field=gid,key,godserver 2023/10/19 20:39:57 127.0.0.1:60919 POST /api/v1/getTasks 2023/10/19 20:39:57 127.0.0.1:60918 POST /api/v1/getTasks 2023/10/19 20:39:57 127.0.0.1:60915 GET /api/v1/getEnvi?field=ip 2023/10/19 20:39:57 127.0.0.1:60914 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion 2023/10/19 20:39:57 [DEBUG] get adapter of device \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:57 [DEBUG] devices: [{\Device\NPF_{B0025A7B-A06D-4EF9-9B24-EDCAC1AB5A07} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{2E00AA30-BFFE-4CCC-8F3A-D0BCF4A27924} WAN Miniport (IPv6) 22 []} {\Device\NPF_{57E4D8D8-3C02-4654-A9F1-2C0D6EB78E4F} WAN Miniport (IP) 22 []} {\Device\NPF_{90F8DD8B-75D1-4037-BF5E-20F1558FA498} Realtek PCIe GbE Family Controller #2 22 [{fd00:6868:6868::47a ffffffffffffffffffffffffffffffff fd00:6868:6868::47a } {fd00:6868:6868:0:44f:7a23:67aa:e621 ffffffffffffffff0000000000000000 fd00:6868:6868:0:ffff:ffff:ffff:ffff } {fd00:6868:6868:0:40a7:17b1:f6e5:2279 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:40a7:17b1:f6e5:2279 } {fd00:6868:6868:0:8490:2c6e:ebcd:28a9 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:8490:2c6e:ebcd:28a9 } {fd00:6868:6868:0:cd2c:5036:198b:5333 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:cd2c:5036:198b:5333 } {fe80::af11:8c47:ee44:ebfc ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.2.219 ffffff00 192.168.2.255 }]} {\Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} Meta Tunnel 22 [{fe80::ac30:1ae6:f91f:95e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {198.18.0.1 fffffffc 198.18.0.3 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{BD3BE26B-505C-4259-91DB-0D4C0FD43E80} Realtek PCIe GbE Family Controller 38 [{fe80::5025:bff6:a6aa:4f4c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.110.52 ffff0000 169.254.255.255 }]}] 2023/10/19 20:39:57 [DEBUG] device name is not match: \Device\NPF_{B0025A7B-A06D-4EF9-9B24-EDCAC1AB5A07} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:57 [DEBUG] device name is not match: \Device\NPF_{2E00AA30-BFFE-4CCC-8F3A-D0BCF4A27924} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:57 [DEBUG] device name is not match: \Device\NPF_{57E4D8D8-3C02-4654-A9F1-2C0D6EB78E4F} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:57 [DEBUG] device name is not match: \Device\NPF_{90F8DD8B-75D1-4037-BF5E-20F1558FA498} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:39:57 [DEBUG] getGatewayMac: \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 0.0.0.0 2023/10/19 20:39:57 127.0.0.1:60925 GET /api/v1/getEnvi?field=licenseInfo,midKey 2023/10/19 20:39:58 find router mac is 45:00:00:1f:84:68 2023/10/19 20:39:58 [DEBUG] fetch mac address: \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 45:00:00:1f:84:68 2023/10/19 20:39:58 [DEBUG] close pcap handler for getGatewayMac 2023/10/19 20:40:10 127.0.0.1:60960 POST /api/v1/getStatisticsData 2023/10/19 20:40:11 127.0.0.1:60963 POST /api/v1/resumeScan 2023/10/19 20:40:11 goby.Start.LoadCustomRules() err: open C:\Users\Administrator\Desktop\k8\goby-win-x64-2.7.7\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified. 2023/10/19 20:40:11 goby_config BlackTargets: 2023/10/19 20:40:11 scan 1,7,9,13,19,21-23,25,37,42,49,53,69,79-81,85,105,109-111,113,123,135,137-139,143,161,179,222,264,384,389,402,407,443-446,465,500,502,512-515,523-524,540,548,554,587,617,623,689,705,771,783,873,888,902,910,912,921,993,995,998,1000,1024,1030,1035,1090,1098-1103,1128-1129,1158,1199,1211,1220,1234,1241,1300,1311,1352,1433-1435,1440,1494,1521,1530,1533,1581-1582,1604,1720,1723,1755,1811,1900,2000-2001,2049,2082,2083,2100,2103,2121,2199,2207,2222,2323,2362,2375,2380-2381,2525,2533,2598,2601,2604,2638,2809,2947,2967,3000,3037,3050,3057,3128,3200,3217,3273,3299,3306,3311,3312,3389,3460,3500,3628,3632,3690,3780,3790,3817,4000,4322,4433,4444-4445,4659,4679,4848,5000,5038,5040,5051,5060-5061,5093,5168,5247,5250,5351,5353,5355,5400,5405,5432-5433,5498,5520-5521,5554-5555,5560,5580,5601,5631-5632,5666,5800,5814,5900-5910,5920,5984-5986,6000,6050,6060,6070,6080,6082,6101,6106,6112,6262,6379,6405,6502-6504,6542,6660-6661,6667,6905,6988,7001,7021,7071,7080,7144,7181,7210,7443,7510,7579-7580,7700,7770,7777-7778,7787,7800-7801,7879,7902,8000-8001,8008,8014,8020,8023,8028,8030,8080-8082,8087,8090,8095,8161,8180,8205,8222,8300,8303,8333,8400,8443-8444,8503,8800,8812,8834,8880,8888-8890,8899,8901-8903,9000,9002,9060,9080-9081,9084,9090,9099-9099,9111,9152,9200,9390-9391,9443,9495,9809-9815,9855,9999-10001,10008,10050-10051,10080,10098,10162,10202-10203,10443,10616,10628,11000,11099,11211,11234,11333,12174,12203,12221,12345,12397,12401,13364,13500,13838,14330,15200,16102,17185,17200,18881,19300,19810,20010,20031,20034,20101,20111,20171,20222,22222,23472,23791,23943,25000,25025,26000,26122,27000,27017,27888,28222,28784,30000,30718,31001,31099,32764,32913,34205,34443,37718,38080,38292,40007,41025,41080,41523-41524,44334,44818,45230,46823-46824,47001-47002,48899,49152,50000-50004,50013,50500-50504,52302,55553,57772,62078,62514,65535 163.29.57.10/24 2023/10/19 20:40:11 JumpDefend has been enabled and will automatically configure the HTTP interceptor. 2023/10/19 20:40:11 start port scanner: totalSize: 103424, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1697718562549132500, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 0 2023/10/19 20:40:11 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2023/10/19 20:40:11 127.0.0.1:60964 POST /api/v1/getProgress 2023/10/19 20:40:11 found device from route table for 163.29.57.255: \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:40:11 [DEBUG] get adapter of device \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:40:11 [DEBUG] devices: [{\Device\NPF_{B0025A7B-A06D-4EF9-9B24-EDCAC1AB5A07} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{2E00AA30-BFFE-4CCC-8F3A-D0BCF4A27924} WAN Miniport (IPv6) 22 []} {\Device\NPF_{57E4D8D8-3C02-4654-A9F1-2C0D6EB78E4F} WAN Miniport (IP) 22 []} {\Device\NPF_{90F8DD8B-75D1-4037-BF5E-20F1558FA498} Realtek PCIe GbE Family Controller #2 22 [{fd00:6868:6868::47a ffffffffffffffffffffffffffffffff fd00:6868:6868::47a } {fd00:6868:6868:0:44f:7a23:67aa:e621 ffffffffffffffff0000000000000000 fd00:6868:6868:0:ffff:ffff:ffff:ffff } {fd00:6868:6868:0:40a7:17b1:f6e5:2279 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:40a7:17b1:f6e5:2279 } {fd00:6868:6868:0:8490:2c6e:ebcd:28a9 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:8490:2c6e:ebcd:28a9 } {fd00:6868:6868:0:cd2c:5036:198b:5333 ffffffffffffffffffffffffffffffff fd00:6868:6868:0:cd2c:5036:198b:5333 } {fe80::af11:8c47:ee44:ebfc ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.2.219 ffffff00 192.168.2.255 }]} {\Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} Meta Tunnel 22 [{fe80::ac30:1ae6:f91f:95e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {198.18.0.1 fffffffc 198.18.0.3 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{BD3BE26B-505C-4259-91DB-0D4C0FD43E80} Realtek PCIe GbE Family Controller 38 [{fe80::5025:bff6:a6aa:4f4c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.110.52 ffff0000 169.254.255.255 }]}] 2023/10/19 20:40:11 [DEBUG] device name is not match: \Device\NPF_{B0025A7B-A06D-4EF9-9B24-EDCAC1AB5A07} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:40:11 [DEBUG] device name is not match: \Device\NPF_{2E00AA30-BFFE-4CCC-8F3A-D0BCF4A27924} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:40:11 [DEBUG] device name is not match: \Device\NPF_{57E4D8D8-3C02-4654-A9F1-2C0D6EB78E4F} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:40:11 [DEBUG] device name is not match: \Device\NPF_{90F8DD8B-75D1-4037-BF5E-20F1558FA498} != \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 2023/10/19 20:40:11 [DEBUG] getGatewayMac: \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 163.29.57.255 2023/10/19 20:40:12 find router mac is 45:00:00:1f:84:69 2023/10/19 20:40:13 [DEBUG] fetch mac address: \Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 45:00:00:1f:84:69 2023/10/19 20:40:13 [DEBUG] close pcap handler for getGatewayMac 2023/10/19 20:40:13 select adapter of to send packets: &{\Device\NPF_{0AFD3ED9-02C8-0811-124D-1682118B6574} 198.18.0.1 [fe80::ac30:1ae6:f91f:95e] {198.18.0.1 fffffffc} fffffffc Meta Tunnel 45:00:00:1f:84:69} 2023/10/19 20:40:13 port scanner is ready 2023/10/19 20:40:13 routine-recv start 2023/10/19 20:40:14 start first round ARP 2023/10/19 20:40:14 first round ARP done 2023/10/19 20:40:14 127.0.0.1:60972 POST /api/v1/getProgress 2023/10/19 20:40:14 127.0.0.1:60973 POST /api/v1/getStatisticsData 2023/10/19 20:40:14 3.252s 0/103424 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2023/10/19 20:40:15 start sending packets 2023/10/19 20:40:15 [WARNING] Error SerializeLayers:invalid src MAC:

WOWNTT123 avatar Oct 19 '23 12:10 WOWNTT123

未看到完整错误,请联系微信:gobyteam。为您尽快解决,感谢您的反馈与支持。

gobysec avatar Oct 25 '23 03:10 gobysec