OpenWRT builds a personal web site and combines intranet penetration to achieve remote access to the public network

Article directory Preface 1. Check uhttpd installation 2. Deploy the web site 3. Install cpolar intranet penetration 4. Configure remote access address 5. Configure fixed remote address Foreword uhttpd is a web server written from scratch by OpenWrt/LuCI developers. It aims to become an excellent, stable, lightweight task HTTP server suitable for embedded devices, and […]

Teach you how to penetrate the intranet

0x00 Preface Intranet penetration is mainly based on the early peripheral management of the webserver with getshell. By collecting information on the webserver, it then conducts password attacks on other intranet hosts. Of course, there are also some attacks based on vulnerabilities. Concepts related to the intranet will not be introduced here. You can search […]

Quickly build a website on Linux and use intranet penetration to achieve public network access to the Pagoda Panel

Article directory Preface 1. Environment installation 2. Install cpolar intranet penetration 3. Intranet penetration 4. Fixed http address 5. Configure the second-level subdomain name 6. Create a test page Foreword As a simple and easy-to-use server operation and maintenance management panel, Pagoda Panel supports Linux/Windows systems. We can use it to configure LAMP/LNMP environments, websites, […]

How to use Synology NAS’s Audio Station combined with intranet penetration to achieve remote access to the local music library

Article directory The problem this tutorial solves is: After following this tutorial method, the effect achieved is: The environment used for this tutorial: 1 Install audiostation package on Synology system 2 Download the mobile app 3 Intranet penetration, mapping to public network Many old people want to listen to their favorite songs or cross talk […]

SVN server construction in Linux environment and integration with intranet penetration to achieve remote connection

Article directory Preface 1. Install SVN service on Ubuntu 2. Modify configuration file 2.1 Modify the svnserve.conf file 2.2 Modify passwd file 2.3 Modify authz file 3. Start the svn service 4. Intranet penetration 4.1 Install cpolar intranet penetration 4.2 Create tunnel mapping local port 5. Test public network access 6. Configure a fixed public […]

Intranet penetration based on SSRF+Redis

Intranet penetration based on SSRF + Redis 1. WEB server configuration 1. Ugly topology map 2. Add network card For the second network card, select vmnet1. It doesn’t matter if you customize it later. The purpose is to prevent the host from communicating with network card 2. 3. Set to fixed IP #Query the current […]

Vulnerability anti-connection detection combination: intranet penetration and multi-protocol reuse port

http://Yaklang.io anti-connection technology three axe Anti-connection service Multi-protocol port multiplexing Intranet penetration What is anti-connection? Why do it Many times, when we perform vulnerability detection, we cannot determine whether a vulnerability exists through the information returned by the application. But if the command/special operation is indeed executed, how do we prove that the command or […]

[vscode remote development] Use intranet penetration to achieve remote access in a public network environment

Article directory Preface 1. Install OpenSSH 2. vscode configure ssh 3. LAN test connection to remote server 4. Public network remote connection 4.1 Install cpolar intranet penetration on ubuntu 4.2 Create tunnel mapping 4.3 Test public network remote connection 5. Configure a fixed TCP port address 5.1 Reserve a fixed TCP port address 5.2 Configure […]

Java Alipay sandbox environment payment, SDK interface remote debugging [intranet penetration]

Article directory @[TOC] 1. Test environment 2. Local configuration 2. Intranet penetration 2.1 Download and install cpolar intranet penetration 2.2 Create tunnel 3. Test public network access 4. Configure a fixed second-level subdomain name 4.1 Reserve a second-level subdomain name 4.2 Configure the second-level subdomain name 5. Use fixed second-level subdomain names for access 1. […]

Docker Compose deploys Spug: achieving intranet penetration

Article directory Preface 1. Docker installation Spug 2. Local access test 3. Linux installation cpolar 4. Configure Spug public network access address 5. Remote access to Spug management interface through public network 6. Fixed Spug public network address Foreword Spug is a lightweight agent-less automated operation and maintenance platform designed for small and medium-sized enterprises. […]