Common intranet penetration tools include ngrok/localtunnel/frp

1. Working principle of intranet penetration tool

The working principle of the intranet penetration tool is to forward public network traffic to services in the local network by establishing a channel between the local network and the public network. In this way, users can access services in the local network through the public network when there is no public IP or direct access.

2. Common intranet penetration tools include ngrok, localtunnel and frp

2.1. snort :

  • Introduction: ngrok is a powerful and easy-to-use intranet penetration tool that supports multiple protocols and custom subdomain names, and has a simple command line interface and Web interface.
  • Usage: To use ngrok, you need to register an ngrok account. Download the ngrok client for your operating system, unzip it and run the command line tool. By specifying the local service port that needs to be exposed, ngrok will generate a public domain name for you, and you can access the local service through this domain name.
  • Official link: https://ngrok.com/

2.2. localtunnel

  • Introduction: localtunnel is a simple intranet penetration tool, built based on Node.js, easy to install and use.
  • How to use: First, make sure you have Node.js and npm installed. Install the localtunnel command line tool in the terminal: npm install -g localtunnel. Then, run the localtunnel command in the terminal and specify the local service port that needs to be exposed. localtunnel will generate a public domain name for you, through which you can access local services.
  • Official link: https://localtunnel.github.io/www/

2.3. frp

  • Introduction: frp is a powerful intranet penetration tool that supports multiple protocols and custom configurations, and is suitable for complex network environments and requirements.
  • How to use: Download and install the frp client for your operating system from frp's official link. Configure the frp client, including defining the local service port and remote access port. Run the frp client, which will establish a connection with the frp server and forward public network traffic to the local service.
  • Official link: https://github.com/fatedier/frp

It is recommended to consult official documentation or related tutorials for the latest guidance before use.

Please note that when using intranet penetration tools, ensure that your local service is secure and take appropriate security measures, such as using access passwords, restricting access scope, etc., to protect your network and data security.

Guess you like

Origin blog.csdn.net/holyvslin/article/details/132981426