lanproxy penetration within the network service deployment

Developers often need to network service penetration test out the address line, you will need a public network

Frequently used network penetration tools are: peanut shells, ngrok, magic tunnel, but these third-party domain names are random, custom domain names are charging.

The Internet to find an open source network penetration tools, server-side deployment hosts on the Internet, client deployment, including network.

Therefore, this article explain how to build a network with lanproxy penetration of service

Built environment
of a public network server (as used herein, is Ubuntu 16.04.3 LTS), run lanproxy server
server environment JDK (openjdk used herein 1.8.0_151)
client machine, run lanproxy client, also requires the java environment need to install jdk and maven
build process
to obtain the source code and compile lanproxy
to lanproxy the github to acquire the source code to address local
git clone [email protected]: ffay / lanproxy.git
into the implementation of the project directory mvn package large package compile, package compiled files in the distribution directory, including client and server
lanproxy penetration within the network service deployment
configuration and start the
server end
in conf proxy-server-0.1 folder is a small server-side configuration files

server.bind = 0.0.0.0 # service address
server.port = 4900 # port services

#ssl 配置可以默认
server.ssl.enable=true
server.ssl.bind=0.0.0.0
server.ssl.port=4993
server.ssl.jksPath=test.jks
server.ssl.keyStorePassword=123456
server.ssl.keyManagerPassword=123456
server.ssl.needsClientAuth=false

config.server.bind = 0.0.0.0 # service management access page address
config.server.port = 8090 # page management service access port
config.admin.username = admin # Service Management page to access the user name
config.admin.password = admin # service management page access password
can be configured on after the completion of the file transfer is added to the server, execute the following command
scp -r proxy-server-0.1 user @ premote_ip: remote_dolder

Perform proxy-server-0.1 / bin files on the server folder under startuo.sh, the server starts

On top of the browser to access your server ip + prot you can see the management page
lanproxy penetration within the network service deployment

Enter the above configuration of your username and password to log in, go in the configuration

First, add a client:
lanproxy penetration within the network service deployment

After adding success in client management can see that the client just added:
lanproxy penetration within the network service deployment

Then just add to the success of the client configuration:
lanproxy penetration within the network service deployment

Just enter the name of the agent, it is generally easy to produce with the name of a local service agent to see

A client agent can configure multiple local service port
client-side
in conf proxy-client-0.1 folder is clent small side configuration file

client.key = key # this key is Client Server in client management keys
ssl.enable = false
ssl.jksPath = test.jks
ssl.keyStorePassword = 123456

server.host = # add this server address, you can configure the domain name can also be a public network Ip

IS 4993 ssl Port #default
server.port server port = 4900 #
This client is a java version of jdk environment is needed, the configuration is complete perform startup.bat bin directory in the window, run the bin in linux (mac) environment startup.sh directory

Guess you like

Origin blog.51cto.com/7704223/2407770