Intranet penetration (NAT penetration) principle + tools (some do not require administrator privileges)

Intranet penetration, that is, NAT (Network Address Translation) penetration

The essence of intranet penetration is the realization of intranet mapping and conversion of intranet addresses to external addresses. The implementation process requires end-to-end data transmission and the principle of port forwarding. The intranet mapping method can solve the problem of no public network IP and a general solution for accessing the internal network from the external network.

The purpose of achieving intranet penetration is to ensure that data packets with a specific source IP address and source port number are not shielded by the NAT device and correctly routed to the intranet host (because the NAT device automatically shields the connection initiated by the non-intranet host, Thereby protecting the attack of the external network but also bringing difficulties for P2P communication).

The principle of intranet penetration : NAT equipment (or software) maintains a state table, which is used to map the private IP address of the internal network to the legal IP address of the external network. The IP address and port information in each packet header are modified and translated into a correct IP address in the NAT device (or software) and sent to the next level. When an internal network host opens an "outgoing" TCP or UDP session through NAT, NAPT assigns this session a public network IP and port to receive the response data packet from the external network, and notify the internal network host after conversion . In this way, NAPT establishes a port binding between [private IP: private port] and [public IP: public port]

Intranet penetration projects or tools

no installation required

Requires installation (admin privileges)

Penetration tool (you need to configure the server and client yourself)

  • frp: A high-performance reverse proxy application focused on intranet penetration, which can expose intranet services to the public network in a safe and convenient manner through transit with public IP nodes

References

Intranet Penetration - Baidu Encyclopedia

Guess you like

Origin blog.csdn.net/m0_64768308/article/details/131283212