当前位置:网站首页>Use Sakura FRP intranet penetration service to build your own website / game server
Use Sakura FRP intranet penetration service to build your own website / game server
2022-06-23 02:44:00 【Star ten weaves】
Blog post address Use Sakura frp Intranet penetration service to build your own website / Game server - Secondary yuan フロントエンド (ecy.ink)
sakura FRP Introduce :
frp Is an open source intranet penetration software , and sakura FRP By akkariin The boss developed , And then transferred to Yukawa Zaomiao ( It looks like it is. akk A good friend who earns millions a month ) Operate a multi-user platform program ( at present akkariin Of sakurapanel Also in the GitHub Open source and build method )
preparation :
You need to prepare your local server program ( For example, to build a website Nginx/Apache etc. ,M Server, etc )
Registered account :
visit natfrp.net, Create an account ( Pay attention to login and registration API It's another one .moe Ending domain name ( At first glance, the rich can afford it ), It is normal to jump to another website ( A good one is so expensive .moe The domain name is used for login ( Make complaints x2)))
After logging in , If you want to build a website, you need real name authentication first (5 Yuan ) You don't need your real name if you don't build a website ( Because someone ghs This causes the node to be blocked )
New tunnel :
The type is selected according to the service you need to penetrate ( Be careful ftp It is impossible to penetrate ) To build a station, you need to choose http or HTTPS And the domain name that has not been filed can only be selected from non mainland servers ( It is suggested that the visit to Hong Kong, China, be fast ) mc Select the server for tcp, Select remote desktop tcp,mcbe Server selection udp,ssh choose tcp.
Local port fill in the port on which your local service listens ( such as mc The server is usually 25565( Cluster multi terminal servers cannot penetrate ), Remote desktop in general 3389,ssh commonly 22)
There is no need to fill in the remote port station , Just fill in your domain name and resolve it , and tcp/udp The remote port of the tunnel is the remote access port after penetration ( The premise is that the port you want to use is not occupied by others )
Select the penetration server ( If the station is not built, the priority will be given to domestic ), Click Create Tunnel , A window will pop up , Copy the startup parameters .
Download the client of the corresponding system .
Windows Make yourself at home Windows That's all right . Download it and unzip it (Linux Unwanted )
Start the client and Tunnel :
Windows System : Open the unzipped folder ,shift+ Right click to start PowerShell perhaps cmd, Then enter the previous startup command (PowerShell May be in frpc with ./)
Linux System : Navigate to the download directory , Input ./frpc….( Followed by the start command , Follow PowerShell The same command )
notice start proxy success That is, the startup is successful
Domain name resolution :
Resolve your domain name to the one given at startup ip Or the domain name ( Not HTTP It can also be direct ip: port visit )
visit :
Then visit your domain name ( Site user ) Or access local services ( such as mc The server ,ssh, Remote desktop ), Successful connection means successful penetration .
About asking questions :
Other issues are not sakura FRP For your own problems, please go to Baidu or owq.moe/channel/natfrp Ask for feedback , Please don't add more small talk groups to ask questions , No one wants to solve some rz problem .
Finally, if there are any questions in the article, you are welcome to point out ava
边栏推荐
- Essentials of fleet video playback and fleet videoplayer video playback components
- How to make a borrowing card
- How to make keyword targeted layout based on search sources?
- 5. concept of ruler method
- How to use pictures in Excel in PPT template
- WebService details
- Reinforcement learning series (III) -gym introduction and examples
- Get the structure of the class through reflection, little chestnut
- Vs code remote SSH configuration
- 5 trends brought to us by customers
猜你喜欢

Understand GB, gbdt and xgboost step by step

How to store, manage and view family photos in an orderly manner?

Google account cannot be logged in & external links cannot be opened automatically & words with words cannot be used

Interviewer: with the for loop, why do you need foreach??

Interviewer: why does TCP shake hands three times and break up four times? Most people can't answer!

Circuit analysis (circuit principle)

5. concept of ruler method
![Buuctf misc-[actf freshman competition 2020]outline](/img/a4/ac9d14a69e0759d1e7c65740415bf7.jpg)
Buuctf misc-[actf freshman competition 2020]outline

Docker installs mysql5.7 and mounts the configuration file

My good brother gave me a difficult problem: retry mechanism
随机推荐
Nebula operator cloud practice
Line to line interviewer | one side of ByteDance
Goframe framework (RK boot): Based on cloud native environment, distinguish configuration files (config)
How to locate memory leaks
The practice of traffic and data isolation in vivo Reviews
HTTP cache
OVS port traffic statistics practice
Log a log4j2 vulnerability handling
Gorilla/mux framework (RK boot): add swagger UI
What is a smart farm?
Buuctf misc-[actf freshman competition 2020]outline
Record a penetration caused by log4j
How to use pictures in Excel in PPT template
5g core network and core network evolution
February 4, 2022: combined total IV. Give you a number composed of different integers
Deep scan log4j2 vulnerability using codesec code audit platform
Biological psychiatry: defining individualized functional neuroanatomy for precision psychiatry
Buuctf misc-[bjdctf2020] Nani
How to generate DataMatrix code in batch through TXT file
Hypervisor Necromancy; Recover kernel protector (2)