nps penetration within the network using

0x00 Foreword

Contrast agents a lot more tools, such as ew flow unstable and easily broken; frsocks currently free to kill, but also easy to break. frp need landing configuration file does not conform to the rules of penetration. reg positive socks, more slowly, scanning is a problem. In fact, I do not need the minimum demands that landing profile, stability is not easy to break, traffic encryption. Test for some time nps is more in line with requirements.

 

0x01 nps build

Download: https://github.com/cnlh/nps/releases

 Modify the server configuration file:

# Web management port 
the httpport
 # Web interface management password 
password
 # server client communication port 
bridePort
 # ssl certFile absolute path 
pemPath
 # ssl keyFile absolute path 
keyPath
 # domain name proxy https proxy listening port 
httpsProxyPort
 # domain name proxy http proxy listening port 
HTTPPROXYPORT
 # Web API free verification IP address 
AuthIP
 # client and server connections kcp or tcp 
bridgeType

Because I am a local test, do not change the file, direct start: ./ nps start can be.

A first increase socks proxy, as shown:

 

Then create a client, remember to be consistent id. as the picture shows:

 

然后去下载client到攻陷机器上执行上述图片命令即可。

本地利用proxifer连接vps的53端口即可。

 

Guess you like

Origin www.cnblogs.com/whoami101/p/11492681.html