当前位置:网站首页>[frp intranet penetration]
[frp intranet penetration]
2022-08-03 05:50:00 【A piece of paper - barren】
Article table of contents
Foreword
frp is an open source intranet penetration software. The working process is as follows:
The server runs on a server with a public IP and listens on a certain port, waiting for the client to connect;
The clientRunning on the internal network machine that needs to be penetrated, after connecting to the server, the server starts to monitor the designated port that the client needs to penetrate;
External network users connect to the designated port monitored by the server, and then the server forwards the user data to the internal networkClient, to achieve intranet penetration.
Simply put, frp acts as a proxy to forward the traffic of internal and external network communication, so that the internal and external networks can communicate.
I. Experiment introduction
Simple topology map
The goal of this experiment is pc3, which isI use kali's host to have access to pc2's shared directory.Kali acts as the frp server and pc1 acts as the client to forward traffic from the external network to the internal network pc2.
pc1 has two network cards, 192.168.20.196 can communicate with kali, but 10.40.1.10 cannot; both pc1 and pc2 have the smb service enabled, and the username and password are both administrator and [email protected]
Remarks: In fact, the more common way to use it is to use frp on the public network, which is the 2 and 3 routes in the above topology diagram, because it itself belongs to the intranet.
Just because the experimental environment is built locally, there is no need to use the frp of the public network, but use kali as the frp server, and take the route 1 route.
Second, mount the shared directory
Since pc1 has enabled the smb service, we can mount it locally so that we can upload files.
mount -t cifs -o 'username=administrator,password=[email protected]' //192.168.20.192/123 /mnt 
Third, configure frp
Server configuration
Open frp service
Configure the client file, because the target system is Windows, so use the Windows configuration file
Send the client's configuration files, frpc.exe and frpc.ini to the mount directory, and upload it to pc1
The next step is to open the client. A wmiexec.py script is used here, which can directly execute the pc1 file locally, provided that the user name and password are known.
Take a look at the file
Run the client again
Successful operation
Fourth, use proxy software to connect frp
Use SSTap software on pc3 host
Test Connection
Because we didn't configure UDP in the first place, it's normal to fail the test, tcp is OK, it doesn't affect.
Then add the route to the target host
Then test the smb connection
Enter the user name and password on the machine to connect successfully, you can view the shared directory.

Summary
The article briefly introduces the use of frp, but when it is practical, the public network frp is used, and the core principles are the same. I hope it will help everyone in the use and understanding of frp.
边栏推荐
猜你喜欢
随机推荐
浏览器中的 preview 和 response 的值不一致
Mysql 预准备语句详解(prepare、execute、deallocate)
`monorepo` 中 `hoist` 机制导致加载配置文件路径的变化
Kettle Spoon 安装配置详解
【DC-4 Range Penetration】
Execute the mysql script file in the docker mysql container and solve the garbled characters
Django从入门到放弃三 -- cookie,session,cbv加装饰器,ajax,django中间件,redis缓存等
中国食品微生物检测行业深度监测及投资战略规划建议报告2022~2028年
Oracle 分区索引详解(local、global)
中国人力资源服务行业投资建议与前景战略规划研究报告2022~2028年
Oracle 注释详解(--、/**/、rem)
Gradle插件与代理服务器导致Sync Project失败的问题
中国水产养殖行业市场投资分析及未来风险预测报告2022~2028年
时间盲注脚本
npm run dev/serve 时报错
该描述怎么写成SQL语句
Flask,3-6
MySQL 索引详解和什么时候创建索引什么时候不适用索引
【DC-2靶场渗透】
图的最短路径的核心——松弛技术









