Hello, everyone, I am amazing. I recently turned my old computer into a NAS, and I wanted to try to penetrate the intranet. I looked at some solutions, but found that none of them were the latest version and could not be used at all. This time I will share with you the steps of intranet penetration that even a monkey can do. 1. Preparation prerequisitesPrepare the following resources in advance:
2. Server-side steps (Tencent Cloud Server)1. DownloadThe latest version of frp, or you can download it in advance and upload it to the server: 2. UnzipUnzip in the downloaded directory: After decompression, the following figure is shown: Enter the unzipped directory: You can see several files, frpc (client script), frpc.toml (client configuration), frps (server script), frps.toml (server configuration) 3. Edit the server configurationWe are currently editing the server configuration: You can use winSCP to connect to the server and open, edit and save directly: Let's check what the following configurations contain: The following are the contents of the configuration file: 4. Open the server firewallThe above ports 7001, 7002, and 7003 are all open in the firewall policy. You can operate in Tencent Cloud: 5. Start the serverAfter completing the above steps, we start the fpr server and use one of the following commands in the directory just unzipped: At this point you can see that the startup is successful: 3. Client-side steps (local server)1. DownloadThe steps for uploading and installing are the same as those on the server: Switch to the frp directory and you can see the following files. 2. Edit the client configurationAlso go to the frp directory and edit the frpc.toml file: 3. Start the clientUse the following command to start the client: At this point, intranet penetration has been achieved: Log in to the frp website to check the service status (public IP + port 7003). The username and password are webServer.user and webServer.password in the server frps.toml. You can see the reverse proxy http service: Now you can access the service on the local Linux server through the public IP + port 7002. |
[[405743]] We often use the localhost domain name...
According to foreign media reports, sources have ...
[[426614]] After understanding the essence, this ...
[[400945]] During the coronavirus outbreak around...
We all know that TCP is a reliable, connection-or...
Song Ge has been serializing gRPC with his friend...
In the early days of network development, there w...
I have shared DiyVM many times in my blog. It is ...
At present, despite the rapid rise of new energy ...
At the 2018 China IT Operation and Maintenance Co...
Hello everyone, I am Zhibeijun. Today, I will lea...
In the next few years, the general direction of n...
File descriptor limits System-level limit: The op...
EtherNetservers is a foreign hosting company esta...
[51CTO.com original article] At 2:00 pm on Thursd...