We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
2022/09/09 10:30:35 read user rule file ok: 0 2022/09/09 10:30:35 Version: v2.0.312+alpha 2022/09/09 10:30:37 API Server listen at 127.0.0.1:8361 2022/09/09 10:30:37 127.0.0.1:52791 GET /api/v1/live 2022/09/09 10:30:46 127.0.0.1:52816 POST /api/v1/setEnvi 2022/09/09 10:30:47 127.0.0.1:52822 GET /api/v1/getEnvi? 2022/09/09 10:30:47 127.0.0.1:52823 POST /api/v1/getTasks 2022/09/09 10:30:47 [DEBUG] get adapter of device \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] devices: [{\Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} Microsoft Wi-Fi Direct Virtual Adapter 46 []} {\Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} WAN Miniport (IPv6) 22 []} {\Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} WAN Miniport (IP) 22 []} {\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} Qualcomm QCA9377 802.11ac Wireless Adapter 30 [{fe80::797a:99e4:e0e:1e4e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.0.120 ffffff00 192.168.0.255 }]} {\Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::8d03:1d67:7230:d203 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.30.1 ffffff00 192.168.30.255 }]} {\Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::e8d2:790c:2b6a:14a4 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.229.1 ffffff00 192.168.229.255 }]} {\Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} Realtek PCIe FE Family Controller 22 [{fe80::2c62:16c1:e130:c8ca ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.66.140 ffffff00 192.168.66.255 }]} {\Device\NPF_{12E1F14C-0919-44D1-8E83-F9B89B1364F2} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::205f:c55d:3175:ecc9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.236.201 ffff0000 169.254.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{D70EDB20-8EF4-45AF-9344-DEF8D6022136} Corechip SR9900 USB2.0 to Fast Ethernet Adapter 38 [{fe80::6dc3:35db:bd02:da6c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.218.108 ffff0000 169.254.255.255 }]} {\Device\NPF_{5C9468CF-BC47-4441-9BB9-3FE5DAD82E87} TAP-Windows Adapter V9 38 [{fe80::ddd3:8c38:a82:d44d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.212.77 ffff0000 169.254.255.255 }]} {\Device\NPF_{A661060A-B59E-4D33-B8AF-925D937A2838} SSL VPN Client Virtual Network Adapter 38 [{fe80::4519:6e02:313f:4004 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.64.4 ffff0000 169.254.255.255 }]}] 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:47 [DEBUG] getGatewayMac: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 0.0.0.0 2022/09/09 10:30:49 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired 2022/09/09 10:30:50 [DEBUG] fetch mac address timeout: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:50 ReadPacketData error: EOF 2022/09/09 10:30:50 [DEBUG] close pcap handler for getGatewayMac 2022/09/09 10:30:50 [DEBUG] fetch gateway mac failed: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 2022/09/09 10:30:51 127.0.0.1:52827 GET /api/v1/getEnvi?field=licenseInfo 2022/09/09 10:30:52 127.0.0.1:52830 POST /api/v1/getStatisticsData 2022/09/09 10:30:54 127.0.0.1:52831 POST /api/v1/resumeScan 2022/09/09 10:30:54 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.0.0/24 2022/09/09 10:30:54 start port scanner: totalSize: 23296, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1662690363711526000, ScanOffset: 23296, ScanICMP: false, CheckAliveMode: 0 2022/09/09 10:30:54 pcap version: Npcap version 1.55, based on libpcap version 1.10.2-PRE-GIT 2022/09/09 10:30:54 127.0.0.1:52832 POST /api/v1/getProgress 2022/09/09 10:30:55 found device from route table for 192.168.0.0: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] get adapter of device \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] devices: [{\Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} Microsoft Wi-Fi Direct Virtual Adapter 46 []} {\Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} WAN Miniport (IPv6) 22 []} {\Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} WAN Miniport (IP) 22 []} {\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} Qualcomm QCA9377 802.11ac Wireless Adapter 30 [{fe80::797a:99e4:e0e:1e4e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.0.120 ffffff00 192.168.0.255 }]} {\Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::8d03:1d67:7230:d203 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.30.1 ffffff00 192.168.30.255 }]} {\Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::e8d2:790c:2b6a:14a4 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.229.1 ffffff00 192.168.229.255 }]} {\Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} Realtek PCIe FE Family Controller 22 [{fe80::2c62:16c1:e130:c8ca ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.66.140 ffffff00 192.168.66.255 }]} {\Device\NPF_{12E1F14C-0919-44D1-8E83-F9B89B1364F2} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::205f:c55d:3175:ecc9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.236.201 ffff0000 169.254.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{D70EDB20-8EF4-45AF-9344-DEF8D6022136} Corechip SR9900 USB2.0 to Fast Ethernet Adapter 38 [{fe80::6dc3:35db:bd02:da6c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.218.108 ffff0000 169.254.255.255 }]} {\Device\NPF_{5C9468CF-BC47-4441-9BB9-3FE5DAD82E87} TAP-Windows Adapter V9 38 [{fe80::ddd3:8c38:a82:d44d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.212.77 ffff0000 169.254.255.255 }]} {\Device\NPF_{A661060A-B59E-4D33-B8AF-925D937A2838} SSL VPN Client Virtual Network Adapter 38 [{fe80::4519:6e02:313f:4004 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.64.4 ffff0000 169.254.255.255 }]}] 2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 2022/09/09 10:30:55 [DEBUG] getGatewayMac: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 192.168.0.0 2022/09/09 10:30:56 find router mac is 80:ea:07:a1:33:39 2022/09/09 10:30:57 [DEBUG] fetch mac address: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 80:ea:07:a1:33:39 2022/09/09 10:30:57 [DEBUG] close pcap handler for getGatewayMac 2022/09/09 10:30:57 select adapter of to send packets: &{\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 192.168.0.120 [fe80::797a:99e4:e0e:1e4e] {192.168.0.120 ffffff00} ffffff00 18:47:3d:de:48:1d Qualcomm QCA9377 802.11ac Wireless Adapter 80:ea:07:a1:33:39} 2022/09/09 10:30:57 routine-recv start 2022/09/09 10:30:57 start first round ARP 2022/09/09 10:30:57 127.0.0.1:52834 POST /api/v1/getProgress 2022/09/09 10:30:57 port scanner is ready 2022/09/09 10:30:57 routine-target is about to exit since target pool is running out 2022/09/09 10:30:57 routine-target is exit since target pool and retry pool is running out 2022/09/09 10:30:57 127.0.0.1:52836 POST /api/v1/getStatisticsData 2022/09/09 10:30:58 found ip-mac: 192.168.0.130 - 18:c0:4d:6b:f9:f1 2022/09/09 10:30:58 GrabScannerStatistics: {0 0 0 1} 2022/09/09 10:30:58 AppScannerStatistics: {0 0 0 1} 2022/09/09 10:30:58 SendPacketCount: 23296 23296 2022/09/09 10:30:58 4.102s 23296/23296 (100.00% N/A left); send: 205 49.97 pkt/s (49.98 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2022/09/09 10:30:58 routine-status is exit since scan is done 2022/09/09 10:30:59 found ip-mac: 192.168.0.126 - 18:c0:4d:a4:a8:57 2022/09/09 10:30:59 found ip-mac: 192.168.0.101 - fe:8c:21:0e:71:f7 2022/09/09 10:30:59 found ip-mac: 192.168.0.106 - ca:0b:1b:c0:41:ec 2022/09/09 10:30:59 found ip-mac: 192.168.0.107 - 90:c5:4a:cd:8a:f5 2022/09/09 10:30:59 first round ARP done 2022/09/09 10:31:00 found ip-mac: 192.168.0.1 - 80:ea:07:a1:33:39 2022/09/09 10:31:00 start sending packets 2022/09/09 10:31:00 routine-send out 2022/09/09 10:31:00 127.0.0.1:52839 POST /api/v1/getStatisticsData 2022/09/09 10:31:00 127.0.0.1:52838 POST /api/v1/getProgress 2022/09/09 10:31:04 127.0.0.1:52845 POST /api/v1/getProgress 2022/09/09 10:31:04 127.0.0.1:52846 POST /api/v1/getStatisticsData 2022/09/09 10:31:04 BasicNetworkInfoScanner out... 2022/09/09 10:31:05 start another round ARP 2022/09/09 10:31:05 found ip-mac: 192.168.0.130 - 18:c0:4d:6b:f9:f1 2022/09/09 10:31:05 found ip-mac: 192.168.0.126 - 18:c0:4d:a4:a8:57 2022/09/09 10:31:06 found ip-mac: 192.168.0.128 - fe:8c:21:0e:71:f7 2022/09/09 10:31:06 found ip-mac: 192.168.0.101 - fe:8c:21:0e:71:f7 2022/09/09 10:31:06 found ip-mac: 192.168.0.102 - c2:4c:28:d3:08:68 2022/09/09 10:31:06 another round ARP done 2022/09/09 10:31:07 found ip-mac: 192.168.0.1 - 80:ea:07:a1:33:39 2022/09/09 10:31:08 127.0.0.1:52855 POST /api/v1/getProgress 2022/09/09 10:31:08 127.0.0.1:52856 POST /api/v1/getStatisticsData 2022/09/09 10:31:10 close pcap sender 2022/09/09 10:31:10 routine-recv out 2022/09/09 10:31:11 routine-pcap-sender is exit 2022/09/09 10:31:11 done: 16.434s 23296/23296 (100.00%) send: 512; recv: 3 2022/09/09 10:31:11 PortScanner out... 2022/09/09 10:31:12 127.0.0.1:52859 POST /api/v1/getProgress 2022/09/09 10:31:12 127.0.0.1:52860 POST /api/v1/getStatisticsData 2022/09/09 10:31:14 GrabScanner out... 2022/09/09 10:31:14 AppScanner out... 2022/09/09 10:31:14 GrabScannerStatistics: {0 0 0 0} 2022/09/09 10:31:14 AppScannerStatistics: {0 0 0 0} 2022/09/09 10:31:14 finished all information, now try to find vulnerabilities... 2022/09/09 10:31:14 [WARNING] LoadJsonFile error: open F:\goby-win-x64-1.9.325\goby-win-x64-1.9.325\golib\exploits\user\Spring_Framework_Data_Binding_Rules_Spring4Shell_RCE_CVE_2022_22965.json: Access is denied. 2022/09/09 10:31:14 [INFO] broadcast: error no name in vul: Spring_Framework_Data_Binding_Rules_Spring4Shell_RCE_CVE_2022_22965.json
2022/09/09 10:31:16 127.0.0.1:52862 POST /api/v1/getProgress 2022/09/09 10:31:16 127.0.0.1:52863 POST /api/v1/getStatisticsData
The text was updated successfully, but these errors were encountered:
未看到完整错误日志,请联系微信:gobyteam。为您尽快解决,感谢您的反馈与支持。
Sorry, something went wrong.
No branches or pull requests
2022/09/09 10:30:35 read user rule file ok: 0
2022/09/09 10:30:35 Version: v2.0.312+alpha
2022/09/09 10:30:37 API Server listen at 127.0.0.1:8361
2022/09/09 10:30:37 127.0.0.1:52791 GET /api/v1/live
2022/09/09 10:30:46 127.0.0.1:52816 POST /api/v1/setEnvi
2022/09/09 10:30:47 127.0.0.1:52822 GET /api/v1/getEnvi?
2022/09/09 10:30:47 127.0.0.1:52823 POST /api/v1/getTasks
2022/09/09 10:30:47 [DEBUG] get adapter of device \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] devices: [{\Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} Microsoft Wi-Fi Direct Virtual Adapter 46 []} {\Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} WAN Miniport (IPv6) 22 []} {\Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} WAN Miniport (IP) 22 []} {\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} Qualcomm QCA9377 802.11ac Wireless Adapter 30 [{fe80::797a:99e4:e0e:1e4e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.0.120 ffffff00 192.168.0.255 }]} {\Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::8d03:1d67:7230:d203 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.30.1 ffffff00 192.168.30.255 }]} {\Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::e8d2:790c:2b6a:14a4 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.229.1 ffffff00 192.168.229.255 }]} {\Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} Realtek PCIe FE Family Controller 22 [{fe80::2c62:16c1:e130:c8ca ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.66.140 ffffff00 192.168.66.255 }]} {\Device\NPF_{12E1F14C-0919-44D1-8E83-F9B89B1364F2} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::205f:c55d:3175:ecc9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.236.201 ffff0000 169.254.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{D70EDB20-8EF4-45AF-9344-DEF8D6022136} Corechip SR9900 USB2.0 to Fast Ethernet Adapter 38 [{fe80::6dc3:35db:bd02:da6c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.218.108 ffff0000 169.254.255.255 }]} {\Device\NPF_{5C9468CF-BC47-4441-9BB9-3FE5DAD82E87} TAP-Windows Adapter V9 38 [{fe80::ddd3:8c38:a82:d44d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.212.77 ffff0000 169.254.255.255 }]} {\Device\NPF_{A661060A-B59E-4D33-B8AF-925D937A2838} SSL VPN Client Virtual Network Adapter 38 [{fe80::4519:6e02:313f:4004 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.64.4 ffff0000 169.254.255.255 }]}]
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] getGatewayMac: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 0.0.0.0
2022/09/09 10:30:49 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2022/09/09 10:30:50 [DEBUG] fetch mac address timeout: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:50 ReadPacketData error: EOF
2022/09/09 10:30:50 [DEBUG] close pcap handler for getGatewayMac
2022/09/09 10:30:50 [DEBUG] fetch gateway mac failed: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:51 127.0.0.1:52827 GET /api/v1/getEnvi?field=licenseInfo
2022/09/09 10:30:52 127.0.0.1:52830 POST /api/v1/getStatisticsData
2022/09/09 10:30:54 127.0.0.1:52831 POST /api/v1/resumeScan
2022/09/09 10:30:54 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.0.0/24
2022/09/09 10:30:54 start port scanner: totalSize: 23296, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1662690363711526000, ScanOffset: 23296, ScanICMP: false, CheckAliveMode: 0
2022/09/09 10:30:54 pcap version: Npcap version 1.55, based on libpcap version 1.10.2-PRE-GIT
2022/09/09 10:30:54 127.0.0.1:52832 POST /api/v1/getProgress
2022/09/09 10:30:55 found device from route table for 192.168.0.0: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] get adapter of device \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] devices: [{\Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} Microsoft Wi-Fi Direct Virtual Adapter 46 []} {\Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} WAN Miniport (IPv6) 22 []} {\Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} WAN Miniport (IP) 22 []} {\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} Qualcomm QCA9377 802.11ac Wireless Adapter 30 [{fe80::797a:99e4:e0e:1e4e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.0.120 ffffff00 192.168.0.255 }]} {\Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::8d03:1d67:7230:d203 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.30.1 ffffff00 192.168.30.255 }]} {\Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::e8d2:790c:2b6a:14a4 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.229.1 ffffff00 192.168.229.255 }]} {\Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} Realtek PCIe FE Family Controller 22 [{fe80::2c62:16c1:e130:c8ca ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.66.140 ffffff00 192.168.66.255 }]} {\Device\NPF_{12E1F14C-0919-44D1-8E83-F9B89B1364F2} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::205f:c55d:3175:ecc9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.236.201 ffff0000 169.254.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{D70EDB20-8EF4-45AF-9344-DEF8D6022136} Corechip SR9900 USB2.0 to Fast Ethernet Adapter 38 [{fe80::6dc3:35db:bd02:da6c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.218.108 ffff0000 169.254.255.255 }]} {\Device\NPF_{5C9468CF-BC47-4441-9BB9-3FE5DAD82E87} TAP-Windows Adapter V9 38 [{fe80::ddd3:8c38:a82:d44d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.212.77 ffff0000 169.254.255.255 }]} {\Device\NPF_{A661060A-B59E-4D33-B8AF-925D937A2838} SSL VPN Client Virtual Network Adapter 38 [{fe80::4519:6e02:313f:4004 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.64.4 ffff0000 169.254.255.255 }]}]
2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] getGatewayMac: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 192.168.0.0
2022/09/09 10:30:56 find router mac is 80:ea:07:a1:33:39
2022/09/09 10:30:57 [DEBUG] fetch mac address: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 80:ea:07:a1:33:39
2022/09/09 10:30:57 [DEBUG] close pcap handler for getGatewayMac
2022/09/09 10:30:57 select adapter of to send packets: &{\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 192.168.0.120 [fe80::797a:99e4:e0e:1e4e] {192.168.0.120 ffffff00} ffffff00 18:47:3d:de:48:1d Qualcomm QCA9377 802.11ac Wireless Adapter 80:ea:07:a1:33:39}
2022/09/09 10:30:57 routine-recv start
2022/09/09 10:30:57 start first round ARP
2022/09/09 10:30:57 127.0.0.1:52834 POST /api/v1/getProgress
2022/09/09 10:30:57 port scanner is ready
2022/09/09 10:30:57 routine-target is about to exit since target pool is running out
2022/09/09 10:30:57 routine-target is exit since target pool and retry pool is running out
2022/09/09 10:30:57 127.0.0.1:52836 POST /api/v1/getStatisticsData
2022/09/09 10:30:58 found ip-mac: 192.168.0.130 - 18:c0:4d:6b:f9:f1
2022/09/09 10:30:58 GrabScannerStatistics: {0 0 0 1}
2022/09/09 10:30:58 AppScannerStatistics: {0 0 0 1}
2022/09/09 10:30:58 SendPacketCount: 23296 23296
2022/09/09 10:30:58 4.102s 23296/23296 (100.00% N/A left); send: 205 49.97 pkt/s (49.98 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2022/09/09 10:30:58 routine-status is exit since scan is done
2022/09/09 10:30:59 found ip-mac: 192.168.0.126 - 18:c0:4d:a4:a8:57
2022/09/09 10:30:59 found ip-mac: 192.168.0.101 - fe:8c:21:0e:71:f7
2022/09/09 10:30:59 found ip-mac: 192.168.0.106 - ca:0b:1b:c0:41:ec
2022/09/09 10:30:59 found ip-mac: 192.168.0.107 - 90:c5:4a:cd:8a:f5
2022/09/09 10:30:59 first round ARP done
2022/09/09 10:31:00 found ip-mac: 192.168.0.1 - 80:ea:07:a1:33:39
2022/09/09 10:31:00 start sending packets
2022/09/09 10:31:00 routine-send out
2022/09/09 10:31:00 127.0.0.1:52839 POST /api/v1/getStatisticsData
2022/09/09 10:31:00 127.0.0.1:52838 POST /api/v1/getProgress
2022/09/09 10:31:04 127.0.0.1:52845 POST /api/v1/getProgress
2022/09/09 10:31:04 127.0.0.1:52846 POST /api/v1/getStatisticsData
2022/09/09 10:31:04 BasicNetworkInfoScanner out...
2022/09/09 10:31:05 start another round ARP
2022/09/09 10:31:05 found ip-mac: 192.168.0.130 - 18:c0:4d:6b:f9:f1
2022/09/09 10:31:05 found ip-mac: 192.168.0.126 - 18:c0:4d:a4:a8:57
2022/09/09 10:31:06 found ip-mac: 192.168.0.128 - fe:8c:21:0e:71:f7
2022/09/09 10:31:06 found ip-mac: 192.168.0.101 - fe:8c:21:0e:71:f7
2022/09/09 10:31:06 found ip-mac: 192.168.0.102 - c2:4c:28:d3:08:68
2022/09/09 10:31:06 another round ARP done
2022/09/09 10:31:07 found ip-mac: 192.168.0.1 - 80:ea:07:a1:33:39
2022/09/09 10:31:08 127.0.0.1:52855 POST /api/v1/getProgress
2022/09/09 10:31:08 127.0.0.1:52856 POST /api/v1/getStatisticsData
2022/09/09 10:31:10 close pcap sender
2022/09/09 10:31:10 routine-recv out
2022/09/09 10:31:11 routine-pcap-sender is exit
2022/09/09 10:31:11 done: 16.434s 23296/23296 (100.00%) send: 512; recv: 3
2022/09/09 10:31:11 PortScanner out...
2022/09/09 10:31:12 127.0.0.1:52859 POST /api/v1/getProgress
2022/09/09 10:31:12 127.0.0.1:52860 POST /api/v1/getStatisticsData
2022/09/09 10:31:14 GrabScanner out...
2022/09/09 10:31:14 AppScanner out...
2022/09/09 10:31:14 GrabScannerStatistics: {0 0 0 0}
2022/09/09 10:31:14 AppScannerStatistics: {0 0 0 0}
2022/09/09 10:31:14 finished all information, now try to find vulnerabilities...
2022/09/09 10:31:14 [WARNING] LoadJsonFile error: open F:\goby-win-x64-1.9.325\goby-win-x64-1.9.325\golib\exploits\user\Spring_Framework_Data_Binding_Rules_Spring4Shell_RCE_CVE_2022_22965.json: Access is denied.
2022/09/09 10:31:14 [INFO] broadcast: error no name in vul: Spring_Framework_Data_Binding_Rules_Spring4Shell_RCE_CVE_2022_22965.json
2022/09/09 10:31:16 127.0.0.1:52862 POST /api/v1/getProgress
2022/09/09 10:31:16 127.0.0.1:52863 POST /api/v1/getStatisticsData
The text was updated successfully, but these errors were encountered: