当前位置:网站首页>Example of peanut shell inner net penetration
Example of peanut shell inner net penetration
2022-07-03 20:12:00 【Issue is FW】
Intranet through
Local services , The Internet cannot be accessed directly ( Not in a LAN , There is no public network on this machine ip)
The port mapping from external network to internal network is realized through intranet penetration technology , To realize external network access and internal network service .
Tools
There are many tools for intranet penetration , Peanut shells are used here Official website
Download peanut shells

Click intranet penetration , The following configuration

Select http bar , There's a charge 6 6 6 Soft girl coin
Write your own intranet host and port , My service is 88 88 88 Port is optional 88 88 88
Save later , The connection is successful

test
For example, it is used here java Do a test
@GetMapping(value = "/")
public String Hello() {
return "Hello,cl ";
}
Local access

Extranet access

边栏推荐
- Battle drag method 1: moderately optimistic, build self-confidence (1)
- Global and Chinese market of liquid antifreeze 2022-2028: Research Report on technology, participants, trends, market size and share
- Global and Chinese market of cyanuric acid 2022-2028: Research Report on technology, participants, trends, market size and share
- PR notes:
- Typora charges, WTF? Still need support
- 4. Data binding
- Difference between surface go1 and surface GO2 (non professional comparison)
- Parental delegation mechanism
- The 29th day of force deduction (DP topic)
- Fingerprint password lock based on Hal Library
猜你喜欢
![AI enhanced safety monitoring project [with detailed code]](/img/a9/cb93f349229e86cbb05ad196ae9553.jpg)
AI enhanced safety monitoring project [with detailed code]

Professional interpretation | how to become an SQL developer

Virtual machine installation deepin system

The 29th day of force deduction (DP topic)

2.5 conversion of different data types (2)

Phpstudy set LAN access

Promethus

Based on laravel 5.5\5.6\5 X solution to the failure of installing laravel ide helper

NFT without IPFs and completely on the chain?

FAQs for datawhale learning!
随机推荐
Rd file name conflict when extending a S4 method of some other package
unittest框架基本使用
What is the difference between a kill process and a close process- What are the differences between kill process and close process?
Global and Chinese market of high purity copper foil 2022-2028: Research Report on technology, participants, trends, market size and share
Sparse matrix (triple) creation, transpose, traversal, addition, subtraction, multiplication. C implementation
Exercises of function recursion
Global and Chinese markets of active matrix LCD 2022-2028: Research Report on technology, participants, trends, market size and share
1.5 learn to find mistakes first
Meso tetra [P - (p-n-carbazole benzylidene imino)] phenylporphyrin (tcipp) /eu (tcipp) [pc( α- 2-oc8h17) 4] and euh (tcipp) [pc (a-2-oc8h17) 4] supplied by Qiyue
PR 2021 quick start tutorial, material import and management
Global and Chinese market of cyanuric acid 2022-2028: Research Report on technology, participants, trends, market size and share
[raid] [simple DP] mine excavation
44. Concurrent programming theory
2166. Design bit set
CesiumJS 2022^ 源码解读[7] - 3DTiles 的请求、加载处理流程解析
Print linked list from end to end
An old programmer gave it to college students
Strict data sheet of new features of SQLite 3.37.0
Gym welcomes the first complete environmental document, which makes it easier to get started with intensive learning!
Point cloud data denoising