You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2024/08/23 09:43:56 192.168.10.97:56164 POST /api/v1/startScan
2024/08/23 09:43:56 [WARNING] change deep-analysis feature is not included in your current license.
2024/08/23 09:43:56 goby.Start.LoadCustomRules() err: open /home/programs/goby/goby-linux-x64-2.5.2/golib/rules/user/cdn-header-rule.json: no such file or directory
2024/08/23 09:43:56 goby_config BlackTargets:
2024/08/23 09:43:56 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.10.8
2024/08/23 09:43:56 start port scanner: totalSize: 91, rate: 1000, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1724377436583961984, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2
2024/08/23 09:43:56 pcap version: libpcap version 1.9.1 (with TPACKET_V3)
2024/08/23 09:43:56 found device from route table for 192.168.10.8: eno2
2024/08/23 09:43:56 [DEBUG] get adapter of device eno2
2024/08/23 09:43:56 [DEBUG] devices: [{eno1 22 [{192.168.11.241 ffffff00 192.168.11.255 } {fe80::2090:5e16:8170:add7 ffffffffffffffff0000000000000000 }]} {veth8eb5be8 22 [{fe80::a85b:bdff:feeb:de5b ffffffffffffffff0000000000000000 }]} {vethae1cc68 22 [{fe80::1cb6:a2ff:fe04:295c ffffffffffffffff0000000000000000 }]} {br-73c2da7e490e 22 [{172.21.0.1 ffff0000 172.21.255.255 } {fe80::42:2bff:feb9:78ea ffffffffffffffff0000000000000000 }]} {vethaf86800 22 [{fe80::b4d0:68ff:fee0:3a19 ffffffffffffffff0000000000000000 }]} {veth6537756 22 [{fe80::9c86:d0ff:fe67:e9f2 ffffffffffffffff0000000000000000 }]} {lo 55 [{127.0.0.1 ff000000 } {::1 ffffffffffffffffffffffffffffffff }]} {any Pseudo-device that captures on all interfaces 54 []} {docker0 34 [{172.17.0.1 ffff0000 172.17.255.255 }]} {eno2 34 [{192.168.100.1 ffffff00 192.168.100.255 } {fe80::fea:383c:a7b3:bedf ffffffffffffffff0000000000000000 }]} {nflog Linux netfilter log (NFLOG) interface 48 []} {nfqueue Linux netfilter queue (NFQUEUE) interface 48 []} {usbmon0 Raw USB traffic, all USB buses 48 []} {usbmon1 Raw USB traffic, bus number 1 0 []} {usbmon2 Raw USB traffic, bus number 2 0 []} {usbmon3 Raw USB traffic, bus number 3 0 []} {usbmon4 Raw USB traffic, bus number 4 0 []}]
2024/08/23 09:43:56 [DEBUG] device name is not match: eno1 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: veth8eb5be8 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: vethae1cc68 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: br-73c2da7e490e != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: vethaf86800 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: veth6537756 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: lo != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: any != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: docker0 != eno2
2024/08/23 09:43:56 [DEBUG] getGatewayMac: eno2 192.168.10.8
2024/08/23 09:43:57 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2024/08/23 09:43:58 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2024/08/23 09:43:59 [DEBUG] fetch mac address timeout: eno2
2024/08/23 09:43:59 ReadPacketData error: EOF
2024/08/23 09:43:59 [DEBUG] close pcap handler for getGatewayMac
2024/08/23 09:43:59 [DEBUG] fetch gateway mac failed: eno2
2024/08/23 09:43:59 select adapter of to send packets: &{eno2 192.168.100.1 [] {192.168.100.1 ffffff00} ffffff00 ac:1f:6b:b5:48:e9 }
2024/08/23 09:43:59 routine-recv start
2024/08/23 09:43:59 port scanner is ready
2024/08/23 09:43:59 routine-target run out ping target pool 2
2024/08/23 09:43:59 alive range after ping2 (1): 192.168.10.8
2024/08/23 09:43:59 start first round ARP
2024/08/23 09:43:59 first round ARP done
2024/08/23 09:44:00 4.114s 0/91 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/08/23 09:44:00 start sending packets
2024/08/23 09:44:00 [WARNING] can not determine dst mac of packet for 192.168.10.8
2024/08/23 09:44:00 routine-target is about to exit since target pool is running out
2024/08/23 09:44:00 routine-target is exit since target pool and retry pool is running out
2024/08/23 09:44:00 not start another round ARP
2024/08/23 09:44:00 routine-send out
2024/08/23 09:44:01 GrabScannerStatistics: {0 0 0 1}
2024/08/23 09:44:01 AppScannerStatistics: {0 0 0 1}
2024/08/23 09:44:01 SendPacketCount: 91 91
2024/08/23 09:44:01 5.114s 91/91 (100.00% 0s left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/08/23 09:44:01 routine-status is exit since scan is done
2024/08/23 09:44:06 BasicNetworkInfoScanner out...
2024/08/23 09:44:10 close pcap sender
2024/08/23 09:44:10 routine-recv out
2024/08/23 09:44:11 routine-pcap-sender is exit
2024/08/23 09:44:11 done: 15.178s 91/91 (100.00%) send: 0; recv: 0
2024/08/23 09:44:11 PortScanner out...
2024/08/23 09:44:16 GrabScanner out...
2024/08/23 09:44:16 AppScanner out...
2024/08/23 09:44:16 no need to scan vulnerabilities, cause not any ip assets
2024/08/23 09:44:16 scan task all finished, now out!
The text was updated successfully, but these errors were encountered:
2024/08/23 09:43:56 192.168.10.97:56164 POST /api/v1/startScan
2024/08/23 09:43:56 [WARNING] change deep-analysis feature is not included in your current license.
2024/08/23 09:43:56 goby.Start.LoadCustomRules() err: open /home/programs/goby/goby-linux-x64-2.5.2/golib/rules/user/cdn-header-rule.json: no such file or directory
2024/08/23 09:43:56 goby_config BlackTargets:
2024/08/23 09:43:56 scan 21,22,23,25,53,U:53,U:69,80,81,U:88,110,111,U:111,123,U:123,135,U:137,139,U:161,U:177,389,U:427,443,445,465,500,515,U:520,U:523,548,623,U:626,636,873,902,1080,1099,1433,U:1434,1521,U:1604,U:1645,U:1701,1883,U:1900,2049,2181,2375,2379,U:2425,3128,3306,3389,4730,U:5060,5222,U:5351,U:5353,5432,5555,5601,5672,U:5683,5900,5938,5984,6000,6379,7001,7077,8080,8081,8443,8545,8686,9000,9001,9042,9092,9100,9200,9418,9999,11211,U:11211,27017,U:33848,37777,50000,50070,61616 192.168.10.8
2024/08/23 09:43:56 start port scanner: totalSize: 91, rate: 1000, connectionSize: 100, connectTimeout: 6s, retryTimes: 0, Random: true, Seed: 1724377436583961984, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2
2024/08/23 09:43:56 pcap version: libpcap version 1.9.1 (with TPACKET_V3)
2024/08/23 09:43:56 found device from route table for 192.168.10.8: eno2
2024/08/23 09:43:56 [DEBUG] get adapter of device eno2
2024/08/23 09:43:56 [DEBUG] devices: [{eno1 22 [{192.168.11.241 ffffff00 192.168.11.255 } {fe80::2090:5e16:8170:add7 ffffffffffffffff0000000000000000 }]} {veth8eb5be8 22 [{fe80::a85b:bdff:feeb:de5b ffffffffffffffff0000000000000000 }]} {vethae1cc68 22 [{fe80::1cb6:a2ff:fe04:295c ffffffffffffffff0000000000000000 }]} {br-73c2da7e490e 22 [{172.21.0.1 ffff0000 172.21.255.255 } {fe80::42:2bff:feb9:78ea ffffffffffffffff0000000000000000 }]} {vethaf86800 22 [{fe80::b4d0:68ff:fee0:3a19 ffffffffffffffff0000000000000000 }]} {veth6537756 22 [{fe80::9c86:d0ff:fe67:e9f2 ffffffffffffffff0000000000000000 }]} {lo 55 [{127.0.0.1 ff000000 } {::1 ffffffffffffffffffffffffffffffff }]} {any Pseudo-device that captures on all interfaces 54 []} {docker0 34 [{172.17.0.1 ffff0000 172.17.255.255 }]} {eno2 34 [{192.168.100.1 ffffff00 192.168.100.255 } {fe80::fea:383c:a7b3:bedf ffffffffffffffff0000000000000000 }]} {nflog Linux netfilter log (NFLOG) interface 48 []} {nfqueue Linux netfilter queue (NFQUEUE) interface 48 []} {usbmon0 Raw USB traffic, all USB buses 48 []} {usbmon1 Raw USB traffic, bus number 1 0 []} {usbmon2 Raw USB traffic, bus number 2 0 []} {usbmon3 Raw USB traffic, bus number 3 0 []} {usbmon4 Raw USB traffic, bus number 4 0 []}]
2024/08/23 09:43:56 [DEBUG] device name is not match: eno1 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: veth8eb5be8 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: vethae1cc68 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: br-73c2da7e490e != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: vethaf86800 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: veth6537756 != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: lo != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: any != eno2
2024/08/23 09:43:56 [DEBUG] device name is not match: docker0 != eno2
2024/08/23 09:43:56 [DEBUG] getGatewayMac: eno2 192.168.10.8
2024/08/23 09:43:57 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2024/08/23 09:43:58 ReadPacketData NextErrorTimeoutExpired error: Timeout Expired
2024/08/23 09:43:59 [DEBUG] fetch mac address timeout: eno2
2024/08/23 09:43:59 ReadPacketData error: EOF
2024/08/23 09:43:59 [DEBUG] close pcap handler for getGatewayMac
2024/08/23 09:43:59 [DEBUG] fetch gateway mac failed: eno2
2024/08/23 09:43:59 select adapter of to send packets: &{eno2 192.168.100.1 [] {192.168.100.1 ffffff00} ffffff00 ac:1f:6b:b5:48:e9 }
2024/08/23 09:43:59 routine-recv start
2024/08/23 09:43:59 port scanner is ready
2024/08/23 09:43:59 routine-target run out ping target pool 2
2024/08/23 09:43:59 alive range after ping2 (1): 192.168.10.8
2024/08/23 09:43:59 start first round ARP
2024/08/23 09:43:59 first round ARP done
2024/08/23 09:44:00 4.114s 0/91 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/08/23 09:44:00 start sending packets
2024/08/23 09:44:00 [WARNING] can not determine dst mac of packet for 192.168.10.8
2024/08/23 09:44:00 routine-target is about to exit since target pool is running out
2024/08/23 09:44:00 routine-target is exit since target pool and retry pool is running out
2024/08/23 09:44:00 not start another round ARP
2024/08/23 09:44:00 routine-send out
2024/08/23 09:44:01 GrabScannerStatistics: {0 0 0 1}
2024/08/23 09:44:01 AppScannerStatistics: {0 0 0 1}
2024/08/23 09:44:01 SendPacketCount: 91 91
2024/08/23 09:44:01 5.114s 91/91 (100.00% 0s left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/08/23 09:44:01 routine-status is exit since scan is done
2024/08/23 09:44:06 BasicNetworkInfoScanner out...
2024/08/23 09:44:10 close pcap sender
2024/08/23 09:44:10 routine-recv out
2024/08/23 09:44:11 routine-pcap-sender is exit
2024/08/23 09:44:11 done: 15.178s 91/91 (100.00%) send: 0; recv: 0
2024/08/23 09:44:11 PortScanner out...
2024/08/23 09:44:16 GrabScanner out...
2024/08/23 09:44:16 AppScanner out...
2024/08/23 09:44:16 no need to scan vulnerabilities, cause not any ip assets
2024/08/23 09:44:16 scan task all finished, now out!
The text was updated successfully, but these errors were encountered: