当前位置:网站首页>Example of peanut shell inner net penetration
Example of peanut shell inner net penetration
2022-07-03 20:12:00 【Issue is FW】
Intranet through
Local services , The Internet cannot be accessed directly ( Not in a LAN , There is no public network on this machine ip
)
The port mapping from external network to internal network is realized through intranet penetration technology , To realize external network access and internal network service .
Tools
There are many tools for intranet penetration , Peanut shells are used here Official website
Download peanut shells

Click intranet penetration , The following configuration

Select http
bar , There's a charge 6 6 6 Soft girl coin
Write your own intranet host and port , My service is 88 88 88 Port is optional 88 88 88
Save later , The connection is successful

test
For example, it is used here java
Do a test
@GetMapping(value = "/")
public String Hello() {
return "Hello,cl ";
}
Local access
Extranet access
边栏推荐
- Derivation of decision tree theory
- About callback function and hook function
- Global and Chinese markets of active matrix LCD 2022-2028: Research Report on technology, participants, trends, market size and share
- 2022-06-28 advanced network engineering (XIII) IS-IS route filtering, route summary, authentication, factors affecting the establishment of Isis neighbor relations, other commands and characteristics
- NFT without IPFs and completely on the chain?
- Plan for the first half of 2022 -- pass the PMP Exam
- Popularize the basics of IP routing
- Acquisition and transmission of parameters in automatic testing of JMeter interface
- 5- (4-nitrophenyl) - 10,15,20-triphenylporphyrin ntpph2/ntppzn/ntppmn/ntppfe/ntppni/ntppcu/ntppcd/ntppco and other metal complexes
- Print linked list from end to end
猜你喜欢
How can the outside world get values when using nodejs to link MySQL
AcWing 1460. Where am i?
PR 2021 quick start tutorial, how to create a new sequence and set parameters?
44. Concurrent programming theory
Today's work summary and plan: February 14, 2022
HCIA-USG Security Policy
2022-06-30 advanced network engineering (XIV) routing strategy - matching tools [ACL, IP prefix list], policy tools [filter policy]
2.7 format output of values
Exercises of function recursion
2.4 conversion of different data types
随机推荐
Exercises of function recursion
4. Data splitting of Flink real-time project
Detailed and not wordy. Share the win10 tutorial of computer reinstallation system
It is discussed that the success of Vit lies not in attention. Shiftvit uses the precision of swing transformer to outperform the speed of RESNET
5. MVVM model
2022 Xinjiang latest road transportation safety officer simulation examination questions and answers
HCIA-USG Security Policy
Phpstudy set LAN access
Test panghu was teaching you how to use the technical code to flirt with girls online on Valentine's Day 520
11-grom-v2-04-advanced query
Blue Bridge Cup: the fourth preliminary - "simulated intelligent irrigation system"
2.6 formula calculation
Meso tetra [P - (p-n-carbazole benzylidene imino)] phenylporphyrin (tcipp) /eu (tcipp) [pc( α- 2-oc8h17) 4] and euh (tcipp) [pc (a-2-oc8h17) 4] supplied by Qiyue
2022 - 06 - 30 networker Advanced (XIV) Routing Policy Matching Tool [ACL, IP prefix list] and policy tool [Filter Policy]
IP address is such an important knowledge that it's useless to listen to a younger student?
2022-06-25 advanced network engineering (XI) IS-IS synchronization process of three tables (neighbor table, routing table, link state database table), LSP, cSNP, psnp, LSP
JMeter plug-in installation
11-grom-v2-05-initialization
AST (Abstract Syntax Tree)
Leetcode daily question solution: 540 A single element in an ordered array