Local debugging payment callback intranet penetration tool

1. Why use intranet penetration

I want to install a B to let other students access my program on the external network, what should I do?
What if I took over a small outsourcing project and demonstrated the demo to the client without a site?
What should I do if there is no external network callback address for functions on other third-party platforms such as WeChat and Alipay?

2. Intranet Penetration Tool

  • Ngrok: open source, old-fashioned penetration tool, many penetration tools are packaged on the basis of it, certification requires 2 yuan , there is a free channel, you can purchase services if you want a stable channel
  • DingTalk Intranet Penetration: The tool is based on the ngrok package, easy to use, and the best choice for individual developers. currently obsolete
  • NATAPP: Free channel , easy to operate, provide http, tcp, udp full tunnel penetration, random domain name/random TCP, UDP port, forced to change domain name/port from time to time.
  • Millet ball ngrok: It is also based on ngrok packaging, an intranet penetration tool maintained by individuals, authentication requires 0.5 yuan , and is easy to operate.
  • Peanut Shell: Haven’t tested it, you need to establish an account for real-name authentication, pay for 2 packs of Weilong Latiao, you can choose a shell domain name, the registration process is cumbersome, and the traffic is limited
  • FRP self-built intranet penetration service: open source, powerful, suitable for development and use in enterprises, can penetrate any conventional legal port (including 22), need to provide cloud server, own domain name, broadband is determined by cloud server

Three, Ngrok

Download address: : https://ngrok.cc/

3.1, download and register

Download the Ngrok client on the official website, and register an account
to download the decompressed file.
insert image description here
After registration, you need to bind their official account first, and then open the tunnel through the intranet. You need to spend money
for real-name authentication first, and you need to spend 2
insert image description here
After successful real-name authentication, you can buy tunnels for 1 yuan . The free ones are extremely unstable, and you will fight for character. You can try it out for $10.
insert image description here
It is free to buy, and you can configure intranet penetration information after entering. After configuration, you can view it in the tunnel management. The most important thing is the tunnel id , which is needed when starting Ngrok.
insert image description here
insert image description here

3.2, start the Ngrok client

Windows computer cmd opens a small black window, cd to the ngrok directory, and then enter the command to start the ngrok client.
The command to start the client

//sunny.exe clientid 隧道ID
sunny.exe clientid 155133361144

insert image description here
After successful intranet penetration
insert image description here
insert image description here

4. DingTalk Intranet Penetration Tool

DingTalk intranet penetration tool document: https://open.dingtalk.com/document/resourcedownload/http-intranet-penetration
has been abandoned on 2022.07.21

4.1, download address

Use the Git clone command to download locally, or download directly on GitHub.
After the download is complete, there will be three folders and a Readme.md file after decompression: linux, mac_64, windows_64. Install the corresponding version as needed. Take Windows as an example here.

git clone https://github.com/open-dingtalk/pierced.git

4.2, use

There are two files in the windows operating system: ding.cfg (configuration file) and ding.exe (cmd command line running program).
cmd opens a black window and runs the command

# 进入可以运行ding.exe文件的目录(windows_64目录)
cd X:xxx/windows_64
# 运行ding.exe文件,参数-subdomain后面的changsheng代表 一会儿域名访问的前缀,80代表我要代理的本地端口
ding.exe -config=./ding.cfg -subdomain=changsheng 80
# 如果出现提示:Server failed to allocate tunnel: The tunnel http://changsheng.vaiwan.com is already registered.
# 说明你需要换一下-subdomain后面的域名前缀或者端口了。

Command parameter description: Excerpted from the official website

parameter illustrate
-config The configuration file for intranet penetration is fixed to the ./ding.cfg provided by DingTalk according to the command and example, without modification
-subdomain The domain name prefix you need to use, the prefix will match before "vaiwan.com". For example, if your subdomain is abcde, abcde.vaiwan.com will be mapped to the local after starting the tool.
port You need to proxy the local service http-server port, for example, your local port is 8080, etc.

After successful penetration, it looks like this. The domain name you need to visit is http://abcde.vaiwan.com/xxxxx instead of http://abcde.vaiwan.com:8082/xxxxx. Do not bring the port number.

Note : Do not close this command line interface. After closing, intranet penetration will be closed.
insert image description here

Five, natapp intranet penetration tool

5.1, download and install

Natapp download address: https://natapp.cn/
Download the Windows version, and unzip it directly after downloading.
insert image description here

5.2, using natapp

2.1, register a natapp account: https://natapp.cn/member/dashborad

2.2, log in to the natapp console, purchase a free tunnel, then click Configure in My Tunnel, configure your local address and port number, and copy the authtoken at the same time.
insert image description here

insert image description here

insert image description here

2.3, start the natapp.exe command installed on the local computer
: start natapp -authtoken=the token copied from the console

insert image description here
insert image description here

Six, millet ball Ngrok

6.1, Registration Download

Official website address: http://ngrok.ciqiuwl.cn/
First register as a user, download the corresponding version of the client.
Download the file content.
insert image description here
After registering an account, real-name authentication is required. It takes a few cents to purchase real-name authentication first, and then go to 'My Account ' page for real-name authentication, copy the token
insert image description here
insert image description here
to set the mapping port of the tunnel, if not set, there is no need to configure here, the system defaults to port 80,
insert image description here
insert image description here

6.2, modify the configuration and start

Find the Mi Ball installation file, and replace the copied token with the token in the configuration file. The
insert image description here
small black window starts the Mi Ball client. If you don’t want to use the black window, you can click one-click to start the tool, and the effect is the same.
Start the command

//小米球客户端启动命令
xiaomiqiu.exe -config xiaomiqiu.conf -log=xiaomiqiu.log -log-level=info start-all

insert image description here
Result after startup
insert image description here
insert image description here

Seven, FRP self-built intranet penetration

frp intranet penetration construction: https://blog.csdn.net/ybsgsg/article/details/125932063

Guess you like

Origin blog.csdn.net/ybsgsg/article/details/126347760