1. Introduction to Holer Tool
Holer exposes local servers behind NATs and firewalls to the public internet over secure tunnels.
Support forwarding message based on TCP protocol.
Holer is a free and open source intranet penetration tool. It can proxy the LAN server to the intranet penetration tool of the public network, and supports forwarding packets based on the TCP protocol.
Holer address: https://github.com/Wisdom-Projects/holer
2. Use Holer external network SSH to access the intranet (local area network) Linux system
2.1. Download the package and unzip it:
Package address: https://github.com/Wisdom-Projects/holer/tree/master/Binary
After downloading ftp/sftp upload it to the Linux system on the intranet (LAN)
Unzip the package: unzip holer-client.zip
2.2. Modify the configuration file
vim holer-client/conf/holer.conf
Address mapping between the public network and the intranet
Holer Access Key | Internet Address | Local Address |
---|---|---|
HOLER_CLIENT-822404317F9D8ADD | 106.14.70.153:65534 | 127.0.0.1:22 |
The default service port of sshd in Intranet (LAN) Linux is 22. Select the Holer Access Key in the record and configure it in the file holer-client/conf/holer.conf
HOLER_ACCESS_KEY=HOLER_CLIENT-822404317F9D8ADD
2.3. Start the Holer service
cd holer-client/bin
Linux system execution command: sh startup.sh
2.4. Public network access to Linux system
Using the ssh client tool, enter the following command to access the Linux system on the intranet (LAN)
ssh [email protected] -p 65534
Example of successful login:
ssh [email protected] -p 65534 [email protected]'s password: [root@ip-172-31-19-0 ~]# [root@ip-172-31-19-0 ~]# ifconfig eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 9001 inet 172.31.19.0 netmask 255.255.240.0 broadcast 172.31.31.255 inet6 fe80::56:7ff:fe0f:782 prefixlen 64 scopeid 0x20<link> ether 02:56:07:0f:07:82 txqueuelen 1000 (Ethernet) RX packets 88018 bytes 126478017 (120.6 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 18631 bytes 1857449 (1.7 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid 0x10<host> loop txqueuelen 1000 (Local Loopback) RX packets 178 bytes 26469 (25.8 KiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 178 bytes 26469 (25.8 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 [root@ip-172-31-19-0 ~]#