当前位置:网站首页>[frp intranet penetration]
[frp intranet penetration]
2022-08-03 05:50:00 【A piece of paper - barren】
Article table of contents
Foreword
frp is an open source intranet penetration software. The working process is as follows:
The server runs on a server with a public IP and listens on a certain port, waiting for the client to connect;
The clientRunning on the internal network machine that needs to be penetrated, after connecting to the server, the server starts to monitor the designated port that the client needs to penetrate;
External network users connect to the designated port monitored by the server, and then the server forwards the user data to the internal networkClient, to achieve intranet penetration.
Simply put, frp acts as a proxy to forward the traffic of internal and external network communication, so that the internal and external networks can communicate.
I. Experiment introduction
Simple topology map
The goal of this experiment is pc3, which isI use kali's host to have access to pc2's shared directory.Kali acts as the frp server and pc1 acts as the client to forward traffic from the external network to the internal network pc2.
pc1 has two network cards, 192.168.20.196 can communicate with kali, but 10.40.1.10 cannot; both pc1 and pc2 have the smb service enabled, and the username and password are both administrator and [email protected]
Remarks: In fact, the more common way to use it is to use frp on the public network, which is the 2 and 3 routes in the above topology diagram, because it itself belongs to the intranet.
Just because the experimental environment is built locally, there is no need to use the frp of the public network, but use kali as the frp server, and take the route 1 route.
Second, mount the shared directory
Since pc1 has enabled the smb service, we can mount it locally so that we can upload files.
mount -t cifs -o 'username=administrator,password=[email protected]' //192.168.20.192/123 /mnt 
Third, configure frp
Server configuration
Open frp service
Configure the client file, because the target system is Windows, so use the Windows configuration file
Send the client's configuration files, frpc.exe and frpc.ini to the mount directory, and upload it to pc1
The next step is to open the client. A wmiexec.py script is used here, which can directly execute the pc1 file locally, provided that the user name and password are known.
Take a look at the file
Run the client again
Successful operation
Fourth, use proxy software to connect frp
Use SSTap software on pc3 host
Test Connection
Because we didn't configure UDP in the first place, it's normal to fail the test, tcp is OK, it doesn't affect.
Then add the route to the target host
Then test the smb connection
Enter the user name and password on the machine to connect successfully, you can view the shared directory.

Summary
The article briefly introduces the use of frp, but when it is practical, the public network frp is used, and the core principles are the same. I hope it will help everyone in the use and understanding of frp.
边栏推荐
猜你喜欢
随机推荐
磁盘空间管理
7.24[C语言零基础 知识点总结]
Apache2-XXE vulnerability penetration
让小程序开发进入 `tailwind jit` 时代
【圣诞节给爱的人打印一颗圣诞树吧】超详细代码实现——圣诞树打印
漫谈Map Reduce 参数优化
TypeError: Cannot read property ‘xxxx‘ of undefined的解决方法
Qlik Sense 赋值详解(Set、Let)
【命令执行与中间件漏洞】
边缘辅助无人机网络的分层联邦学习
php连接数据库脚本
Kettle Spoon 安装配置详解
陆运信息系统——班列项目总结(一)
MySQL 排序
Leetcode刷题——一些用层次遍历解决的问题(111. 二叉树的最小深度、104. 二叉树的最大深度、226. 翻转二叉树、剑指 Offer 27. 二叉树的镜像)
7.16(6)
Execute the mysql script file in the docker mysql container and solve the garbled characters
A-B数对问题|UPC-Count Interval|洛谷-P1102A-B数对
浏览器中的 preview 和 response 的值不一致
【Nmap与Metasploit常用命令】









