We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
024/07/02 16:31:20 [WARNING] change deep-analysis feature is not included in your current license. 2024/07/02 16:31:20 goby.Start.LoadCustomRules() err: open E:\tools\infoget\goby\goby-win-x64-2.8.3\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified. 2024/07/02 16:31:20 goby_config BlackTargets: 2024/07/02 16:31:20 scan 0-9099,9101-65535 222.191.224.42,222.191.224.43,222.191.224.44,222.191.224.45,222.191.224.46 2024/07/02 16:31:20 JumpDefend has been enabled and will automatically configure the HTTP interceptor. 2024/07/02 16:31:20 start port scanner: totalSize: 327675, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 3, Random: true, Seed: 1719909080341340900, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2 2024/07/02 16:31:20 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT 2024/07/02 16:31:20 127.0.0.1:3530 POST /api/v1/getProgress 2024/07/02 16:31:20 Found web 222.191.224.46 80 2024/07/02 16:31:20 Found app: 222.191.224.46 222.191.224.46 80 Nginx 2024/07/02 16:31:20 DoHttpRequest failed: Get "http://222.191.224.46/never_could_exists": EOF 2024/07/02 16:31:20 Found web 222.191.224.42 80 2024/07/02 16:31:20 DoHttpRequest failed: Get "http://222.191.224.42/never_could_exists": EOF 2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 ASP 2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 ASP.NET 2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 jQuery 2024/07/02 16:31:20 127.0.0.1:3551 POST /api/v1/getStatisticsData 2024/07/02 16:31:20 127.0.0.1:3552 POST /api/v1/getTasks 2024/07/02 16:31:20 found device from route table for 222.191.224.46: \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] get adapter of device \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] devices: [{\Device\NPF_{C7C38A09-192F-4B81-9128-07ACD73ADF2C} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{E3110167-1B4E-476B-BEBB-E7D1F91DDE4C} WAN Miniport (IPv6) 22 []} {\Device\NPF_{3CF81345-333F-4F1E-8AB3-BCAE5D67676B} WAN Miniport (IP) 22 []} {\Device\NPF_{6F42D368-3D19-4994-A967-9A907D947EEB} Bluetooth Device (Personal Area Network) 46 [{fe80::8684:faf0:877d:fd8e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.50.55 ffff0000 169.254.255.255 }]} {\Device\NPF_{7A54C04F-9927-40AE-823B-7393DC62B1A3} Intel(R) Wi-Fi 6 AX201 160MHz 30 [{240e:3a2:786:80f0:1698:3e49:89f6:5c3c ffffffffffffffff0000000000000000 240e:3a2:786:80f0:ffff:ffff:ffff:ffff } {240e:3a2:786:80f0:8535:6a50:ed38:2dec ffffffffffffffffffffffffffffffff 240e:3a2:786:80f0:8535:6a50:ed38:2dec } {fe80::f4ed:732f:317:ca8 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.10.31 ffffff00 192.168.10.255 }]} {\Device\NPF_{CF62AAB7-A00C-4790-9F33-068DCD22749E} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::a5d7:d869:3cb1:9069 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.220.1 ffffff00 192.168.220.255 }]} {\Device\NPF_{0B30788A-0EB5-4BD8-95EE-7DE22BA1285C} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::d971:373a:2372:b117 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.128.1 ffffff00 192.168.128.255 }]} {\Device\NPF_{FA828AB5-2C63-431F-9711-7BE148D3AFDE} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::ac78:8590:e840:1ff1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.153.177 ffff0000 169.254.255.255 }]} {\Device\NPF_{339990BA-4A9A-4A2D-8BDD-3B4EF516E30A} Microsoft Wi-Fi Direct Virtual Adapter 46 [{fe80::3599:1289:b67d:dc38 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.84.15 ffff0000 169.254.255.255 }]} {\Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} Clash Tunnel 22 [{198.18.0.1 ffff0000 198.18.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{34B34899-42D4-4E37-A3C2-58DF7B7F45F7} iNode VPN Virtual NIC 38 [{fe80::45a0:b548:f8be:9080 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {10.2.2.2 ffffff00 10.2.2.255 } {169.254.110.72 ffff0000 169.254.255.255 }]} {\Device\NPF_{B069A8F3-0551-4E0A-B64B-A4F336CE154F} OpenVPN Data Channel Offload 38 [{fe80::bc2:8763:d16:787f ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.74.11 ffff0000 169.254.255.255 }]} {\Device\NPF_{C393CDB0-5F81-4EDC-91ED-E7A2A0BE9AB8} Realtek USB GbE Family Controller 38 [{fe80::a5b5:ade7:1acf:2308 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.100.59 ffff0000 169.254.255.255 } {192.168.77.217 ffffff00 192.168.77.255 }]} {\Device\NPF_{158F103C-415C-49F4-9264-850ADCEF4630} Intel(R) Ethernet Connection (16) I219-V 38 [{fe80::e073:16b4:fc9b:50ee ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.180.206 ffff0000 169.254.255.255 } {200.200.9.234 ffffff00 200.200.9.255 }]} {\Device\NPF_{9F05FA57-433D-409A-9485-6A05998D6BB1} TAP-Windows Adapter V9 for OpenVPN Connect 38 [{fe80::2df2:5cf0:d5e:abee ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.90.21 ffff0000 169.254.255.255 }]}] 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{C7C38A09-192F-4B81-9128-07ACD73ADF2C} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{E3110167-1B4E-476B-BEBB-E7D1F91DDE4C} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{3CF81345-333F-4F1E-8AB3-BCAE5D67676B} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{6F42D368-3D19-4994-A967-9A907D947EEB} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{7A54C04F-9927-40AE-823B-7393DC62B1A3} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{CF62AAB7-A00C-4790-9F33-068DCD22749E} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{0B30788A-0EB5-4BD8-95EE-7DE22BA1285C} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{FA828AB5-2C63-431F-9711-7BE148D3AFDE} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{339990BA-4A9A-4A2D-8BDD-3B4EF516E30A} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 2024/07/02 16:31:20 [DEBUG] getGatewayMac: \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 222.191.224.46 2024/07/02 16:31:21 DoHttpRequest failed: Post "http://222.191.224.46/never_could_exists": EOF 2024/07/02 16:31:21 DoHttpRequest failed: Get "http://222.191.224.46/?id=1%20and%201=1": EOF 2024/07/02 16:31:21 DoHttpRequest failed: Get "http://222.191.224.46/axis2/never_could_exists.jws": EOF 2024/07/02 16:31:21 Found app: 222.191.224.46 222.191.224.46 80 Apache-Shiro 2024/07/02 16:31:21 find router mac is 45:00:00:1f:2b:01 2024/07/02 16:31:22 [DEBUG] fetch mac address: \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 45:00:00:1f:2b:01 2024/07/02 16:31:22 [DEBUG] close pcap handler for getGatewayMac 2024/07/02 16:31:22 select adapter of to send packets: &{\Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 198.18.0.1 [] {198.18.0.1 ffff0000} ffff0000 Clash Tunnel 45:00:00:1f:2b:01} 2024/07/02 16:31:22 routine-recv start 2024/07/02 16:31:22 port scanner is ready 2024/07/02 16:31:22 routine-target run out ping target pool 2 2024/07/02 16:31:22 alive range after ping2 (5): 222.191.224.42-222.191.224.46 2024/07/02 16:31:22 routine-target start scan common tcp ports 2024/07/02 16:31:22 start first round ARP 2024/07/02 16:31:22 first round ARP done 2024/07/02 16:31:23 127.0.0.1:3855 POST /api/v1/getProgress 2024/07/02 16:31:23 127.0.0.1:3856 POST /api/v1/getStatisticsData 2024/07/02 16:31:23 3.5s 0/327675 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg) 2024/07/02 16:31:23 start sending packets 2024/07/02 16:31:23 [WARNING] Serialize failed: invalid src MAC: 2024/07/02 16:31:23 routine-send out panic: runtime error: index out of range [0] with length 0 goroutine 2359 [running]: github.com/google/gopacket/pcap.(*Handle).pcapSendpacket(0xc00a4c9e20?, {0x0?, 0x1f?, 0x0?}) github.com/google/[email protected]/pcap/pcap_windows.go:658 +0x6d github.com/google/gopacket/pcap.(*Handle).WritePacketData(...) github.com/google/[email protected]/pcap/pcap.go:696 git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).sendSYN(0xc0098aa240, 0xdebfe02a, 0x20b) git.gobies.org/goby/[email protected]/pcapsend/send.go:382 +0x192 git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).SendPackets(0xc0098aa240, {0x7ff7a3a05cd0, 0xc00ad4c2d0}, 0xc00b815ce0?, 0x12?, 0x2?) git.gobies.org/goby/[email protected]/pcapsend/send.go:1648 +0x77b created by git.gobies.org/goby/portscanner.(*PortScanner).startPcapScan in goroutine 100 git.gobies.org/goby/[email protected]/portscanner.go:219 +0x268
The text was updated successfully, but these errors were encountered:
您好,请升级到最新版本 2.9.5重新扫描尝试,若未解决可联系客服微信:gobyteam
Sorry, something went wrong.
No branches or pull requests
024/07/02 16:31:20 [WARNING] change deep-analysis feature is not included in your current license.
2024/07/02 16:31:20 goby.Start.LoadCustomRules() err: open E:\tools\infoget\goby\goby-win-x64-2.8.3\golib\rules\user\cdn-header-rule.json: The system cannot find the file specified.
2024/07/02 16:31:20 goby_config BlackTargets:
2024/07/02 16:31:20 scan 0-9099,9101-65535 222.191.224.42,222.191.224.43,222.191.224.44,222.191.224.45,222.191.224.46
2024/07/02 16:31:20 JumpDefend has been enabled and will automatically configure the HTTP interceptor.
2024/07/02 16:31:20 start port scanner: totalSize: 327675, rate: 100, connectionSize: 100, connectTimeout: 6s, retryTimes: 3, Random: true, Seed: 1719909080341340900, ScanOffset: 0, ScanICMP: false, CheckAliveMode: 2
2024/07/02 16:31:20 pcap version: Npcap version 1.60, based on libpcap version 1.10.2-PRE-GIT
2024/07/02 16:31:20 127.0.0.1:3530 POST /api/v1/getProgress
2024/07/02 16:31:20 Found web 222.191.224.46 80
2024/07/02 16:31:20 Found app: 222.191.224.46 222.191.224.46 80 Nginx
2024/07/02 16:31:20 DoHttpRequest failed: Get "http://222.191.224.46/never_could_exists": EOF
2024/07/02 16:31:20 Found web 222.191.224.42 80
2024/07/02 16:31:20 DoHttpRequest failed: Get "http://222.191.224.42/never_could_exists": EOF
2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 ASP
2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 ASP.NET
2024/07/02 16:31:20 Found app: 222.191.224.42 222.191.224.42 80 jQuery
2024/07/02 16:31:20 127.0.0.1:3551 POST /api/v1/getStatisticsData
2024/07/02 16:31:20 127.0.0.1:3552 POST /api/v1/getTasks
2024/07/02 16:31:20 found device from route table for 222.191.224.46: \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] get adapter of device \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] devices: [{\Device\NPF_{C7C38A09-192F-4B81-9128-07ACD73ADF2C} WAN Miniport (Network Monitor) 22 []} {\Device\NPF_{E3110167-1B4E-476B-BEBB-E7D1F91DDE4C} WAN Miniport (IPv6) 22 []} {\Device\NPF_{3CF81345-333F-4F1E-8AB3-BCAE5D67676B} WAN Miniport (IP) 22 []} {\Device\NPF_{6F42D368-3D19-4994-A967-9A907D947EEB} Bluetooth Device (Personal Area Network) 46 [{fe80::8684:faf0:877d:fd8e ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.50.55 ffff0000 169.254.255.255 }]} {\Device\NPF_{7A54C04F-9927-40AE-823B-7393DC62B1A3} Intel(R) Wi-Fi 6 AX201 160MHz 30 [{240e:3a2:786:80f0:1698:3e49:89f6:5c3c ffffffffffffffff0000000000000000 240e:3a2:786:80f0:ffff:ffff:ffff:ffff } {240e:3a2:786:80f0:8535:6a50:ed38:2dec ffffffffffffffffffffffffffffffff 240e:3a2:786:80f0:8535:6a50:ed38:2dec } {fe80::f4ed:732f:317:ca8 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.10.31 ffffff00 192.168.10.255 }]} {\Device\NPF_{CF62AAB7-A00C-4790-9F33-068DCD22749E} VMware Virtual Ethernet Adapter for VMnet8 22 [{fe80::a5d7:d869:3cb1:9069 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.220.1 ffffff00 192.168.220.255 }]} {\Device\NPF_{0B30788A-0EB5-4BD8-95EE-7DE22BA1285C} VMware Virtual Ethernet Adapter for VMnet1 22 [{fe80::d971:373a:2372:b117 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {192.168.128.1 ffffff00 192.168.128.255 }]} {\Device\NPF_{FA828AB5-2C63-431F-9711-7BE148D3AFDE} Microsoft Wi-Fi Direct Virtual Adapter #2 46 [{fe80::ac78:8590:e840:1ff1 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.153.177 ffff0000 169.254.255.255 }]} {\Device\NPF_{339990BA-4A9A-4A2D-8BDD-3B4EF516E30A} Microsoft Wi-Fi Direct Virtual Adapter 46 [{fe80::3599:1289:b67d:dc38 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.84.15 ffff0000 169.254.255.255 }]} {\Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} Clash Tunnel 22 [{198.18.0.1 ffff0000 198.18.255.255 }]} {\Device\NPF_Loopback Adapter for loopback traffic capture 55 []} {\Device\NPF_{34B34899-42D4-4E37-A3C2-58DF7B7F45F7} iNode VPN Virtual NIC 38 [{fe80::45a0:b548:f8be:9080 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {10.2.2.2 ffffff00 10.2.2.255 } {169.254.110.72 ffff0000 169.254.255.255 }]} {\Device\NPF_{B069A8F3-0551-4E0A-B64B-A4F336CE154F} OpenVPN Data Channel Offload 38 [{fe80::bc2:8763:d16:787f ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.74.11 ffff0000 169.254.255.255 }]} {\Device\NPF_{C393CDB0-5F81-4EDC-91ED-E7A2A0BE9AB8} Realtek USB GbE Family Controller 38 [{fe80::a5b5:ade7:1acf:2308 ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.100.59 ffff0000 169.254.255.255 } {192.168.77.217 ffffff00 192.168.77.255 }]} {\Device\NPF_{158F103C-415C-49F4-9264-850ADCEF4630} Intel(R) Ethernet Connection (16) I219-V 38 [{fe80::e073:16b4:fc9b:50ee ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.180.206 ffff0000 169.254.255.255 } {200.200.9.234 ffffff00 200.200.9.255 }]} {\Device\NPF_{9F05FA57-433D-409A-9485-6A05998D6BB1} TAP-Windows Adapter V9 for OpenVPN Connect 38 [{fe80::2df2:5cf0:d5e:abee ffffffffffffffff0000000000000000 fe80::ffff:ffff:ffff:ffff } {169.254.90.21 ffff0000 169.254.255.255 }]}]
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{C7C38A09-192F-4B81-9128-07ACD73ADF2C} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{E3110167-1B4E-476B-BEBB-E7D1F91DDE4C} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{3CF81345-333F-4F1E-8AB3-BCAE5D67676B} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{6F42D368-3D19-4994-A967-9A907D947EEB} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{7A54C04F-9927-40AE-823B-7393DC62B1A3} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{CF62AAB7-A00C-4790-9F33-068DCD22749E} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{0B30788A-0EB5-4BD8-95EE-7DE22BA1285C} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{FA828AB5-2C63-431F-9711-7BE148D3AFDE} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] device name is not match: \Device\NPF_{339990BA-4A9A-4A2D-8BDD-3B4EF516E30A} != \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB}
2024/07/02 16:31:20 [DEBUG] getGatewayMac: \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 222.191.224.46
2024/07/02 16:31:21 DoHttpRequest failed: Post "http://222.191.224.46/never_could_exists": EOF
2024/07/02 16:31:21 DoHttpRequest failed: Get "http://222.191.224.46/?id=1%20and%201=1": EOF
2024/07/02 16:31:21 DoHttpRequest failed: Get "http://222.191.224.46/axis2/never_could_exists.jws": EOF
2024/07/02 16:31:21 Found app: 222.191.224.46 222.191.224.46 80 Apache-Shiro
2024/07/02 16:31:21 find router mac is 45:00:00:1f:2b:01
2024/07/02 16:31:22 [DEBUG] fetch mac address: \Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 45:00:00:1f:2b:01
2024/07/02 16:31:22 [DEBUG] close pcap handler for getGatewayMac
2024/07/02 16:31:22 select adapter of to send packets: &{\Device\NPF_{330EAEF8-7578-5DF2-D97B-8DADC0EA85CB} 198.18.0.1 [] {198.18.0.1 ffff0000} ffff0000 Clash Tunnel 45:00:00:1f:2b:01}
2024/07/02 16:31:22 routine-recv start
2024/07/02 16:31:22 port scanner is ready
2024/07/02 16:31:22 routine-target run out ping target pool 2
2024/07/02 16:31:22 alive range after ping2 (5): 222.191.224.42-222.191.224.46
2024/07/02 16:31:22 routine-target start scan common tcp ports
2024/07/02 16:31:22 start first round ARP
2024/07/02 16:31:22 first round ARP done
2024/07/02 16:31:23 127.0.0.1:3855 POST /api/v1/getProgress
2024/07/02 16:31:23 127.0.0.1:3856 POST /api/v1/getStatisticsData
2024/07/02 16:31:23 3.5s 0/327675 (0.00% N/A left); send: 0 0.00 pkt/s (0.00 pkt/s avg); recv: 0 0.00 pkt/s (0.00 pkt/s avg)
2024/07/02 16:31:23 start sending packets
2024/07/02 16:31:23 [WARNING] Serialize failed: invalid src MAC:
2024/07/02 16:31:23 routine-send out
panic: runtime error: index out of range [0] with length 0
goroutine 2359 [running]:
github.com/google/gopacket/pcap.(*Handle).pcapSendpacket(0xc00a4c9e20?, {0x0?, 0x1f?, 0x0?})
github.com/google/[email protected]/pcap/pcap_windows.go:658 +0x6d
github.com/google/gopacket/pcap.(*Handle).WritePacketData(...)
github.com/google/[email protected]/pcap/pcap.go:696
git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).sendSYN(0xc0098aa240, 0xdebfe02a, 0x20b)
git.gobies.org/goby/[email protected]/pcapsend/send.go:382 +0x192
git.gobies.org/goby/portscanner/pcapsend.(*PcapSender).SendPackets(0xc0098aa240, {0x7ff7a3a05cd0, 0xc00ad4c2d0}, 0xc00b815ce0?, 0x12?, 0x2?)
git.gobies.org/goby/[email protected]/pcapsend/send.go:1648 +0x77b
created by git.gobies.org/goby/portscanner.(*PortScanner).startPcapScan in goroutine 100
git.gobies.org/goby/[email protected]/portscanner.go:219 +0x268
The text was updated successfully, but these errors were encountered: