Jump to content
  • Entries

    16114
  • Comments

    7952
  • Views

    86388696

Contributors to this blog

  • HireHackking 16114

About this blog

Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.

In a previous article. We talked about how to use FRP for intranet mapping. This allows intranet devices to be logged in through the public network. However, frp is relatively implemented by configuring command parameters. It's still a bit challenging for Xiaobai. Today I will introduce another simple method.NPS搭建

About NPS

nps is a lightweight, high-performance, and powerful intranet penetration proxy server. Currently, it supports tcp and udp traffic forwarding, and can support any tcp and udp upper-layer protocol (access to intranet websites, local payment interface debugging, SSH access, remote desktop, intranet dns resolution, etc.). In addition, it also supports intranet ttp proxy and intranet socks5 proxy, and has a powerful web management end.

Experimental Environment

Public network vps (server centos7) user side (kali linux, Windows 10)

Download nps

First, download it to the project address according to your own system type. The server is linux_arm64_server.tar.gz The client is windows_amd64_client.tar.gz

Installing the server

Download the server side according to the type of the public network server.xld4ptk5coz3645.png

mkdir nps

cd

wget https://github.com/ehang-io/nps/releases/download/v0.26.10/linux_amd64_server.tar.gz

tar -zxvf linux_amd64_server.tar.gz configuration nps.confvim conf/nps.conf modification part

#web

web_host=a.o.com —— Cloud server public IP address

web_username=admin ——web console account settings

web_password=123 ——web console password settings

web_port=8080

web_ip=0.0.0.0

web_base_url=

web_open_ssl=false

web_cert_file=conf/server.pem

web_key_file=conf/server.key eok02bcghhu3646.png Install nps execution command

./nps install

./nps start #Start z0nrv0xfvbs3647.png

Access the web console

Browser access ip:8080 (the corresponding ports need to be opened for security group and firewall) vvfaf1i3p013649.png

Enter the account number and password in your configuration file to log in.m0zme1ps0qx3653.png

As mentioned above, after logging in to the background, we only need to add the mapped target in the background according to actual needs.

Add mapping directory

After the configuration is completed, click Submit.

Then click on the client and add a new client. Record the key!32oca11nktx3654.png

Click tcp—— to add and fill in the corresponding parameters according to the actual situation. Note that the client ID is the client ID we created in the previous step.ofadbiuwgms3655.png

Configure client

Here, let’s take kali’s port 22 as an example.

First, download the corresponding client linux_arm64_client.tar.gz.

mkdir nps

wget https://github.com/ehang-io/nps/releases/download/v0.26.10/linux_arm64_client.tar.gz

tar -zxvf linux_arm64_client.tar.gz is decompressed, the file is as follows 3imhruq0u3u3656.png

Connect

We only need the following command to achieve the connection.

./npc -server=Public IP:8024 -vkey=Your client key -type=tcp yulbhubh32y3657.png

The client has also been successfully launched.lzaxngo0fvd3658.png

Test

osrm54ocg0s3659.png