Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

发生未知错误 #345

Open
hacky0u opened this issue Sep 9, 2022 · 2 comments
Open

发生未知错误 #345

hacky0u opened this issue Sep 9, 2022 · 2 comments
Labels
invalid This doesn't seem right

Comments

@hacky0u
Copy link

hacky0u commented Sep 9, 2022

2022/09/09 10:30:35 read user rule file ok: 0
2022/09/09 10:30:35 Version: v2.0.312+alpha
2022/09/09 10:30:37 API Server listen at 127.0.0.1:8361
2022/09/09 10:30:37 127.0.0.1:52791 GET /api/v1/live
2022/09/09 10:30:46 127.0.0.1:52816 POST /api/v1/setEnvi
2022/09/09 10:30:47 127.0.0.1:52822 GET /api/v1/getEnvi?
2022/09/09 10:30:47 127.0.0.1:52823 POST /api/v1/getTasks
2022/09/09 10:30:47 [DEBUG] get adapter of device \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] devices: [{\Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} Microsoft Wi-Fi Direct Virtual Adapter 46 []} {\Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} WAN Miniport (IPv6) 22 []} {\Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} WAN Miniport (IP) 22 []} {\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} Qualcomm QCA9377 802.11ac Wireless Adapter 30 [{fe80::797a:99e4:e0e:1e4e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.0.120 ffffff00 192.168.0.255 }]} {\Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::8d03:1d67:7230:d203 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.30.1 ffffff00 192.168.30.255 }]} {\Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::e8d2:790c:2b6a:14a4 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.229.1 ffffff00 192.168.229.255 }]} {\Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} Realtek PCIe FE Family Controller 22 [{fe80::2c62:16c1:e130:c8ca ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.66.140 ffffff00 192.168.66.255 }]} {\Device\NPF_{12E1F14C-0919-44D1-8E83-F9B89B1364F2} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::205f:c55d:3175:ecc9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.236.201 ffff0000 169.254.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{D70EDB20-8EF4-45AF-9344-DEF8D6022136} Corechip SR9900 USB2.0 to Fast Ethernet Adapter 38 [{fe80::6dc3:35db:bd02:da6c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.218.108 ffff0000 169.254.255.255 }]} {\Device\NPF_{5C9468CF-BC47-4441-9BB9-3FE5DAD82E87} TAP-Windows Adapter V9 38 [{fe80::ddd3:8c38:a82:d44d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.212.77 ffff0000 169.254.255.255 }]} {\Device\NPF_{A661060A-B59E-4D33-B8AF-925D937A2838} SSL VPN Client Virtual Network Adapter 38 [{fe80::4519:6e02:313f:4004 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.64.4 ffff0000 169.254.255.255 }]}]
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] device name is not match: \Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} != \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:47 [DEBUG] getGatewayMac: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} 0.0.0.0
2022/09/09 10:30:49 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2022/09/09 10:30:50 [DEBUG] fetch mac address timeout: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:50 ReadPacketData error: EOF
2022/09/09 10:30:50 [DEBUG] close pcap handler for getGatewayMac
2022/09/09 10:30:50 [DEBUG] fetch gateway mac failed: \Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27}
2022/09/09 10:30:51 127.0.0.1:52827 GET /api/v1/getEnvi?field=licenseInfo
2022/09/09 10:30:52 127.0.0.1:52830 POST /api/v1/getStatisticsData
2022/09/09 10:30:54 127.0.0.1:52831 POST /api/v1/resumeScan
2022/09/09 10:30:54 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.0.0/24
2022/09/09 10:30:54 start port scanner: totalSize: 23296, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1662690363711526000, ScanOffset: 23296, ScanICMP: false, CheckAliveMode: 0
2022/09/09 10:30:54 pcap version: Npcap version 1.55, based on libpcap version 1.10.2-PRE-GIT
2022/09/09 10:30:54 127.0.0.1:52832 POST /api/v1/getProgress
2022/09/09 10:30:55 found device from route table for 192.168.0.0: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] get adapter of device \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] devices: [{\Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} Microsoft Wi-Fi Direct Virtual Adapter 46 []} {\Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} WAN Miniport (IPv6) 22 []} {\Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} WAN Miniport (IP) 22 []} {\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} Qualcomm QCA9377 802.11ac Wireless Adapter 30 [{fe80::797a:99e4:e0e:1e4e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.0.120 ffffff00 192.168.0.255 }]} {\Device\NPF_{A8B31ACF-93A4-4B17-9C15-49A8C24E4C27} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::8d03:1d67:7230:d203 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.30.1 ffffff00 192.168.30.255 }]} {\Device\NPF_{2046A9AE-CE67-44CE-987F-9F0F0E23C923} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::e8d2:790c:2b6a:14a4 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.229.1 ffffff00 192.168.229.255 }]} {\Device\NPF_{A158946B-F5C2-48A4-B352-494226B55F27} Realtek PCIe FE Family Controller 22 [{fe80::2c62:16c1:e130:c8ca ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.66.140 ffffff00 192.168.66.255 }]} {\Device\NPF_{12E1F14C-0919-44D1-8E83-F9B89B1364F2} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::205f:c55d:3175:ecc9 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.236.201 ffff0000 169.254.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{D70EDB20-8EF4-45AF-9344-DEF8D6022136} Corechip SR9900 USB2.0 to Fast Ethernet Adapter 38 [{fe80::6dc3:35db:bd02:da6c ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.218.108 ffff0000 169.254.255.255 }]} {\Device\NPF_{5C9468CF-BC47-4441-9BB9-3FE5DAD82E87} TAP-Windows Adapter V9 38 [{fe80::ddd3:8c38:a82:d44d ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.212.77 ffff0000 169.254.255.255 }]} {\Device\NPF_{A661060A-B59E-4D33-B8AF-925D937A2838} SSL VPN Client Virtual Network Adapter 38 [{fe80::4519:6e02:313f:4004 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.64.4 ffff0000 169.254.255.255 }]}]
2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{CBE339C6-CCBB-4C0E-BC1B-A691C8A714EE} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{DBDE36D1-820B-4210-B952-E3AC6DA6A9B4} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{CF170949-8F56-46C7-BFF2-DAD18F5FF12E} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] device name is not match: \Device\NPF_{137C40A9-4B0D-4ED0-9B07-BE406534F852} != \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271}
2022/09/09 10:30:55 [DEBUG] getGatewayMac: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 192.168.0.0
2022/09/09 10:30:56 find router mac is 80:ea:07:a1:33:39
2022/09/09 10:30:57 [DEBUG] fetch mac address: \Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 80:ea:07:a1:33:39
2022/09/09 10:30:57 [DEBUG] close pcap handler for getGatewayMac
2022/09/09 10:30:57 select adapter of to send packets: &{\Device\NPF_{D5966847-9D07-44D2-8B90-51502FE31271} 192.168.0.120 [fe80::797a:99e4:e0e:1e4e] {192.168.0.120 ffffff00} ffffff00 18:47:3d:de:48:1d Qualcomm QCA9377 802.11ac Wireless Adapter 80:ea:07:a1:33:39}
2022/09/09 10:30:57 routine-recv start
2022/09/09 10:30:57 start first round ARP
2022/09/09 10:30:57 127.0.0.1:52834 POST /api/v1/getProgress
2022/09/09 10:30:57 port scanner is ready
2022/09/09 10:30:57 routine-target is about to exit since target pool is running out
2022/09/09 10:30:57 routine-target is exit since target pool and retry pool is running out
2022/09/09 10:30:57 127.0.0.1:52836 POST /api/v1/getStatisticsData
2022/09/09 10:30:58 found ip-mac: 192.168.0.130 - 18:c0:4d:6b:f9:f1
2022/09/09 10:30:58 GrabScannerStatistics: {0 0 0 1}
2022/09/09 10:30:58 AppScannerStatistics: {0 0 0 1}
2022/09/09 10:30:58 SendPacketCount: 23296 23296
2022/09/09 10:30:58 4.102s 23296/23296 (100.00% N/A left); send: 205 49.97 pkt/s (49.98 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2022/09/09 10:30:58 routine-status is exit since scan is done
2022/09/09 10:30:59 found ip-mac: 192.168.0.126 - 18:c0:4d:a4:a8:57
2022/09/09 10:30:59 found ip-mac: 192.168.0.101 - fe:8c:21:0e:71:f7
2022/09/09 10:30:59 found ip-mac: 192.168.0.106 - ca:0b:1b:c0:41:ec
2022/09/09 10:30:59 found ip-mac: 192.168.0.107 - 90:c5:4a:cd:8a:f5
2022/09/09 10:30:59 first round ARP done
2022/09/09 10:31:00 found ip-mac: 192.168.0.1 - 80:ea:07:a1:33:39
2022/09/09 10:31:00 start sending packets
2022/09/09 10:31:00 routine-send out
2022/09/09 10:31:00 127.0.0.1:52839 POST /api/v1/getStatisticsData
2022/09/09 10:31:00 127.0.0.1:52838 POST /api/v1/getProgress
2022/09/09 10:31:04 127.0.0.1:52845 POST /api/v1/getProgress
2022/09/09 10:31:04 127.0.0.1:52846 POST /api/v1/getStatisticsData
2022/09/09 10:31:04 BasicNetworkInfoScanner out...
2022/09/09 10:31:05 start another round ARP
2022/09/09 10:31:05 found ip-mac: 192.168.0.130 - 18:c0:4d:6b:f9:f1
2022/09/09 10:31:05 found ip-mac: 192.168.0.126 - 18:c0:4d:a4:a8:57
2022/09/09 10:31:06 found ip-mac: 192.168.0.128 - fe:8c:21:0e:71:f7
2022/09/09 10:31:06 found ip-mac: 192.168.0.101 - fe:8c:21:0e:71:f7
2022/09/09 10:31:06 found ip-mac: 192.168.0.102 - c2:4c:28:d3:08:68
2022/09/09 10:31:06 another round ARP done
2022/09/09 10:31:07 found ip-mac: 192.168.0.1 - 80:ea:07:a1:33:39
2022/09/09 10:31:08 127.0.0.1:52855 POST /api/v1/getProgress
2022/09/09 10:31:08 127.0.0.1:52856 POST /api/v1/getStatisticsData
2022/09/09 10:31:10 close pcap sender
2022/09/09 10:31:10 routine-recv out
2022/09/09 10:31:11 routine-pcap-sender is exit
2022/09/09 10:31:11 done: 16.434s 23296/23296 (100.00%) send: 512; recv: 3
2022/09/09 10:31:11 PortScanner out...
2022/09/09 10:31:12 127.0.0.1:52859 POST /api/v1/getProgress
2022/09/09 10:31:12 127.0.0.1:52860 POST /api/v1/getStatisticsData
2022/09/09 10:31:14 GrabScanner out...
2022/09/09 10:31:14 AppScanner out...
2022/09/09 10:31:14 GrabScannerStatistics: {0 0 0 0}
2022/09/09 10:31:14 AppScannerStatistics: {0 0 0 0}
2022/09/09 10:31:14 finished all information, now try to find vulnerabilities...
2022/09/09 10:31:14 [WARNING] LoadJsonFile error: open F:\goby-win-x64-1.9.325\goby-win-x64-1.9.325\golib\exploits\user\Spring_Framework_Data_Binding_Rules_Spring4Shell_RCE_CVE_2022_22965.json: Access is denied.
2022/09/09 10:31:14 [INFO] broadcast: error no name in vul: Spring_Framework_Data_Binding_Rules_Spring4Shell_RCE_CVE_2022_22965.json

2022/09/09 10:31:16 127.0.0.1:52862 POST /api/v1/getProgress
2022/09/09 10:31:16 127.0.0.1:52863 POST /api/v1/getStatisticsData

@gobysec gobysec added the invalid This doesn't seem right label Sep 25, 2023
@gobysec
Copy link
Owner

gobysec commented Oct 7, 2023

未看到完整错误日志,请联系微信:gobyteam。为您尽快解决,感谢您的反馈与支持。

@hacky0u
Copy link
Author

hacky0u commented Oct 7, 2023 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
invalid This doesn't seem right
Projects
None yet
Development

No branches or pull requests

2 participants