Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

goby 不适配深信服atrtus,代理无法扫描,一直报错 #462

Open
c0010 opened this issue Sep 15, 2023 · 2 comments
Open

goby 不适配深信服atrtus,代理无法扫描,一直报错 #462

c0010 opened this issue Sep 15, 2023 · 2 comments
Labels
bug Something isn't working

Comments

@c0010
Copy link

c0010 commented Sep 15, 2023

2023/09/15 11:28:55 [DEBUG] runtime.NumCPU():12, runtime.GOMAXPROCS():10
2023/09/15 11:28:55 read user rule file ok: 0
2023/09/15 11:28:55 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0
2023/09/15 11:28:55 init repleace log regex len: 3
2023/09/15 11:28:55 Grab version: grab_version_1.9.1.0
2023/09/15 11:28:55 Support 344 protocols, 804 ports
2023/09/15 11:28:55 Version: v2.7.5
2023/09/15 11:28:55 init cdn check client: Get "https://cdn.nuclei.sh": read tcp 172.20.10.2:48527->172.66.40.212:443: wsarecv: An existing connection was forcibly closed by the remote host.
2023/09/15 11:28:57 API Server listen at 127.0.0.1:8361
2023/09/15 11:28:57 pcap version: Npcap version 1.75, based on libpcap version 1.10.4
2023/09/15 11:28:57 found device from route table for 8.8.8.8: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] get adapter of device \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] devices: [{\Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{172.20.10.2 fffffff0 172.20.10.15 }]} {\Device\NPF_{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF_{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 38 [{172.10.7.136 ffffff00 172.10.7.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}]
2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] device name is not match: \Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:28:57 [DEBUG] getGatewayMac: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 8.8.8.8
2023/09/15 11:28:58 127.0.0.1:48661 GET /api/v1/live
2023/09/15 11:28:58 find router mac is 06:bc:6d:6b:cc:64
2023/09/15 11:28:59 127.0.0.1:48671 POST /api/v1/setEnvi
2023/09/15 11:28:59 [DEBUG] fetch mac address: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 06:bc:6d:6b:cc:64
2023/09/15 11:28:59 [DEBUG] close pcap handler for getGatewayMac
2023/09/15 11:28:59 select adapter of to send packets: &{\Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 172.20.10.2 [] {172.20.10.2 fffffff0} fffffff0 24:41:8c:f9:1a:05 Intel(R) Wi-Fi 6 AX200 160MHz 06:bc:6d:6b:cc:64}
2023/09/15 11:28:59 127.0.0.1:48674 GET /api/v1/getEnvi?field=chromePath,dataIntegrity,datadir,dir,midKey,proxyServer,userRuleSize,vulVersion
2023/09/15 11:28:59 127.0.0.1:48675 GET /api/v1/getEnvi?field=ip
2023/09/15 11:28:59 127.0.0.1:48676 GET /api/v1/getEnvi?field=gid,key,godserver
2023/09/15 11:28:59 127.0.0.1:48677 POST /api/v1/getPOCList
2023/09/15 11:28:59 127.0.0.1:48678 POST /api/v1/getTasks
2023/09/15 11:29:00 127.0.0.1:48680 GET /api/v1/getEnvi?field=licenseInfo,midKey
2023/09/15 11:29:00 [DEBUG] get adapter of device \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] devices: [{\Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{172.20.10.2 fffffff0 172.20.10.15 }]} {\Device\NPF_{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF_{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 38 [{172.10.7.136 ffffff00 172.10.7.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}]
2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] device name is not match: \Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16}
2023/09/15 11:29:00 [DEBUG] getGatewayMac: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 0.0.0.0
2023/09/15 11:29:00 auto-select the fastest DNS server: 223.6.6.6:53 36.53595ms
2023/09/15 11:29:01 find router mac is 06:bc:6d:6b:cc:64
2023/09/15 11:29:01 [DEBUG] fetch mac address: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} 06:bc:6d:6b:cc:64
2023/09/15 11:29:01 [DEBUG] close pcap handler for getGatewayMac
2023/09/15 11:43:23 127.0.0.1:9409 GET /api/v1/listAdapters
2023/09/15 11:43:31 127.0.0.1:9440 POST /api/v1/setEnvi
2023/09/15 11:43:35 127.0.0.1:9451 POST /api/v1/setEnvi
2023/09/15 11:43:36 127.0.0.1:9455 POST /api/v1/getTasks
2023/09/15 11:43:38 127.0.0.1:9466 POST /api/v1/getStatisticsData
2023/09/15 11:43:39 127.0.0.1:9468 POST /api/v1/resumeScan
2023/09/15 11:43:39 goby.Start.LoadCustomRules() err: open D:\goby-win-x64-2.7.5-Community\goby-win-x64-2.7.5\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified.
2023/09/15 11:43:39 goby_config BlackTargets:
2023/09/15 11:43:39 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 10.11.64.115
2023/09/15 11:43:39 start port scanner: totalSize: 90, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1694746111357905100, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 0
2023/09/15 11:43:39 pcap version: Npcap version 1.75, based on libpcap version 1.10.4
2023/09/15 11:43:39 [DEBUG] get adapter of device \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 127.0.0.1:9469 POST /api/v1/getProgress
2023/09/15 11:43:39 [DEBUG] devices: [{\Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} WAN Miniport (IPv6) 22 []} {\Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} WAN Miniport (IP) 22 []} {\Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} Bluetooth Device (Personal Area Network) 46 [{169.254.183.222 ffff0000 169.254.255.255 } {fe80::f223:2697:fef7:6fe ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} Intel(R) Wi-Fi 6 AX200 160MHz 30 [{192.168.137.149 ffffff00 192.168.137.255 }]} {\Device\NPF_{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} VMware Virtual Ethernet Adapter for VMnet8 22 [{169.254.251.184 ffff0000 169.254.255.255 } {fe80::e38:fefb:fc56:f050 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f ffffffffffffffffffffffffffffffff fd15:4ba5:5a2b:1008:c473:c40e:ccee:1e3f } {fd15:4ba5:5a2b:1008:8250:863e:196e:5dc5 ffffffffffffffff0000000000000000 fd15:4ba5:5a2b:1008:ffff:ffff:ffff:ffff }]} {\Device\NPF_{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} VMware Virtual Ethernet Adapter for VMnet1 22 [{169.254.52.129 ffff0000 169.254.255.255 } {fe80::a378:379b:19ff:6a82 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} ASIX AX88179A USB 3.2 Gen1 to Gigabit Ethernet Adapter 22 [{169.254.158.132 ffff0000 169.254.255.255 } {fe80::2ba7:4640:81b5:6e97 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{DB5D23C4-6264-4DFF-8D52-C395D62210C0} Microsoft Wi-Fi Direct Virtual Adapter #3 46 [{169.254.118.35 ffff0000 169.254.255.255 } {fe80::795c:e84b:e66c:cc12 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{169.254.5.43 ffff0000 169.254.255.255 } {fe80::9b7a:125b:22e3:603a ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} aTrust Tunnel 22 [{2.0.0.1 ffffff00 2.0.0.255 } {fd0a:b001:c002:d003:eb2f:4132:610d:5669 ffffffffffffffffffffffffffffffff fd0a:b001:c002:d003:eb2f:4132:610d:5669 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 [{::1 ffffffffffffffffffffffffffffffff } {127.0.0.1 ff000000 }]} {\Device\NPF_{0D77AE3C-B964-47C6-BF50-29C49E132490} Sangfor SSL VPN CS Support System VNIC 38 [{169.254.29.114 ffff0000 169.254.255.255 } {fe80::b914:1aa2:aa52:3bf1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{68D5F9A5-B4A8-4B8C-93DC-F823CF03481F} SecTap Adapter 38 [{169.254.217.11 ffff0000 169.254.255.255 } {fe80::2c42:94c9:70b8:d0f2 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]} {\Device\NPF_{19A29A49-63E5-4FCB-8BCE-0D47E780B503} TAP-Windows Adapter V9 38 [{20.0.255.2 ffff0000 20.0.255.255 } {fe80::c06d:3585:e8a6:f7c3 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff }]}]
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{AE6CC830-54BB-4F2E-AD56-DE7263AD9FCD} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{9FFE216B-94B2-4BF9-A9A8-9D23AD382D7F} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{F1225004-CA14-4604-A958-2D1B0CCD565F} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{DCC368A8-D704-402C-8640-02D33CDEDF20} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{6CB891EA-6304-48F2-8AB4-CBBFE21DCD16} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{6B20CAE0-2173-4D56-AC3D-F638A3DBB425} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{1B6B0758-2D44-4B0C-9A96-EA00881D68E4} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{5D79B3F9-54A4-4B8B-9666-F5DB56830C2C} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{DB5D23C4-6264-4DFF-8D52-C395D62210C0} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] device name is not match: \Device\NPF_{0F5FB24D-8688-4C54-BE9F-BAE387C3E14B} != \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48}
2023/09/15 11:43:39 [DEBUG] getGatewayMac: \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 10.11.64.115
2023/09/15 11:43:40 find router mac is 45:00:00:1f:55:dc
2023/09/15 11:43:41 [DEBUG] fetch mac address: \Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 45:00:00:1f:55:dc
2023/09/15 11:43:41 [DEBUG] close pcap handler for getGatewayMac
2023/09/15 11:43:41 select adapter of to send packets: &{\Device\NPF_{D0400FDB-3E4F-E6F9-A10C-67A5E938DA48} 2.0.0.1 [] {2.0.0.1 ffffff00} ffffff00 aTrust Tunnel 45:00:00:1f:55:dc}
2023/09/15 11:43:41 routine-recv start
2023/09/15 11:43:41 port scanner is ready
2023/09/15 11:43:41 start first round ARP
2023/09/15 11:43:41 first round ARP done
2023/09/15 11:43:42 127.0.0.1:9487 POST /api/v1/getStatisticsData
2023/09/15 11:43:42 127.0.0.1:9486 POST /api/v1/getProgress
2023/09/15 11:43:42 3.157s 0/90 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2023/09/15 11:43:42 start sending packets
2023/09/15 11:43:42 [WARNING] Serialize failed: invalid src MAC:
2023/09/15 11:43:42 routine-send out
panic: runtime error: index out of range [0] with length 0

goroutine 156 [running]:
github.com/google/gopacket/pcap.(*Handle).pcapSendpacket(0xc001fdf1a0?, {0x0?, 0x1f?, 0x0?})
github.com/google/gopacket@v1.1.20-0.20210429153827-3eaba0894325/pcap/pcap_windows.go:658 +0x76
github.com/google/gopacket/pcap.(*Handle).WritePacketData(...)
github.com/google/gopacket@v1.1.20-0.20210429153827-3eaba0894325/pcap/pcap.go:696
git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).sendUDP(0xc008116750, 0xa0b4073, 0x8438)
git.gobies.org/goby/portscanner@v0.0.6/pcapsend/send.go:1165 +0x20f
git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).SendPackets(0xc008116750, {0x326e090, 0xc006ad8400}, 0x0?, 0x0?, 0x0?)
git.gobies.org/goby/portscanner@v0.0.6/pcapsend/send.go:1676 +0x74a
created by git.gobies.org/goby/portscanner.(*PortScanner).startPcapScan
git.gobies.org/goby/portscanner@v0.0.6/portscanner.go:219 +0x28a

@gobysec gobysec added the bug Something isn't working label Sep 25, 2023
@gobysec
Copy link
Owner

gobysec commented Oct 7, 2023

已收到您的反馈,我们尽快优化,优化后会向您致谢,您可以联系微信号:gobyteam,感谢您对Goby喜爱与支持~

@gobysec
Copy link
Owner

gobysec commented Oct 9, 2023

重装pcap,如还有报错请携带操作系统架构添加微信号gobyteam,为您解决~

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants