当前位置:网站首页>Network remote access using raspberry pie
Network remote access using raspberry pie
2022-06-25 13:44:00 【dedsec0x】
One 、 Software preparation
1. Raspberry pie mirror image
Official website :Raspberry Pi OS – Raspberry Pi
2.SDCardFormatterv5
SD Memory Card Formatter | SD Association (sdcard.org)
3. Burning tools Raspberry Pi
4.putty
Download PuTTY: latest release (0.77) (greenend.org.uk)
Two 、 operation
SD Card format
Open it up and download okay SDCardFormatter Take us SD Format the card

Format successful


burn
Open our burning tool , Select the image we want to burn and the SD Click burn on the card

Burning succeeded after waiting for a period of time

The network configuration
open SD card , stay boot Create a directory SSH file
Create an empty text file wpa_supplicant.conf
Enter... In the text
country=CN
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev
update_config=1
network={
ssid=" Your wireless network name "
psk=" Your wireless password "
key_mgmt=WPA-PSK
priority=1
}

take SD Unplug the card, insert the raspberry pie and connect the power to the raspberry pie , You can see on your phone that raspberry pie has been connected , Check out the raspberry pie ip Address , You can download one Advanced IP Scanner, Open terminal input ipconfig, View the wireless hotspot IP Address , And then in IP Scanner Mid search


Make sure that our computers are also connected to mobile phone hotspots , notice ip The address is 192.168.79.57, Search while searching 192.168.79.1-255
That's how we found our raspberry pie IP Address

putty Remote connection
open putty, stay putty Enter the just ip, Then establish a connection , Enter the default user password
Default user :pi
The default password :raspberry
If the default account password is incorrect , Can be in boot Create a userconf.txt file , This file is a single line of text , from username: User name content -password: password form —— That is, the desired user name , Follow a colon , Followed by an encrypted representation of the password to be used .
Or configure the account and password when writing the image

Then enter our account and password again to enter the system

Configure raspberry pie sudo raspi-config 
And then choose interface options

open VNC service

Then open the VNC Viewer
Type in the raspberry pie ip, Then enter the account and password

And it worked .
3、 ... and 、 Create an account and create... In your personal folder assert Assertion c Program
Create user
Open the terminal and input the command
su -
useradd -m -s /bin/bash user name
// password
passwd user name When the permission is not enough, you can su prefix sudo that will do
Then go to the created folder /home/ user name / in
create a file assert.c, Enter in file
#include <assert.h>
#include <stdio.h>
int main()
{
int a;
char str[50];
printf(" Please enter an integer value : ");
scanf("%d", &a);
assert(a >= 10);
printf(" The integer entered is : %d\n", a);
printf(" Please enter the string : ");
scanf("%s", str);
assert(str != NULL);
printf(" The input string is : %s\n", str);
return(0);
}
If you cannot create a file, you can use the command
sudo chmod -R 777 / working directory
touch assert.c
vim asssert.cAnd then you can edit

And then use gcc Compile the

Four 、 Use scp The command is on two Linux Data transmission between systems
scp
scp yes secure copy Abbreviation , yes linux Based on ssh Log in for secure remote file copy command .scp It's encrypted. ,rcp It's not encrypted ,scp yes rcp The enhanced .
because scp The transmission is encrypted , It may affect the speed a little . in addition ,scp It doesn't take up resources , It will not increase the system load much , At this point ,rsync It's far less than that . although rsync Than scp It will be faster , But when there are lots of small files ,rsync It will cause the hard disk I/O Very high , and scp Basically does not affect the normal use of the system .
Basic grammar shi
scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
[-l limit] [-o ssh_option] [-P port] [-S program]
[[[email protected]]host1:]file1 [...] [[[email protected]]host2:]file2
// Parameter description
-1: mandatory scp Command usage protocol ssh1
-2: mandatory scp Command usage protocol ssh2
-4: mandatory scp The command only uses IPv4 Addressing
-6: mandatory scp The command only uses IPv6 Addressing
-B: Use batch mode ( Do not ask for transmission password or phrase during transmission )
-C: Allow compression .( take -C The sign is passed on to ssh, To turn on compression )
-p: Keep the modification time of the original document , Access time and access rights .
-q: Do not show transfer progress bar .
-r: Recursively copy the entire directory .
-v: Detailed display output .scp and ssh(1) The debugging information of the whole process will be displayed . This information is used to debug connections , Validation and configuration issues .
-c cipher: With cipher Encrypt the data transmission , This option will be passed directly to ssh.
-F ssh_config: Designate an alternative ssh The configuration file , This parameter is passed directly to ssh.
-i identity_file: The key file used to read the transfer from the specified file , This parameter is passed directly to ssh.
-l limit: Limit the bandwidth that users can use , With Kbit/s In units of .
-o ssh_option: If you are used to using ssh_config(5) Parameter passing method in ,
-P port: Notice that it's capital P, port Is the port number used for data transmission
-S program: Specify the program to use when encrypting the transmission . This procedure must be able to understand ssh(1) The option to .example
Download on virtual machine and raspberry pie respectively ssh


Put the raspberries in the pie you practiced before assert.c Upload the file to the virtual machine
scp -r [email protected]:/home/lm/assert.c ./
complete

5、 ... and 、 Reference resources
边栏推荐
- Storage related contents of data in memory
- 深入理解深度神经网络背后的数学(Mysteries of Neural Networks Part I)
- 字符串各操作函数与内存函数详解
- 关于结构体,枚举,联合的一些知识
- 算力&NFT交易平台F3.xyz旗下独家权益NFT项目Hash Eagle将盛大发行
- 学习编程的起点。
- 数据采集系统网关采集工厂效率
- About data storage in memory
- Is it safe to open an account with tongdaxin stock?
- Detailed explanation of string operation functions and memory functions
猜你喜欢

一次性讲清楚 Handler 可能导致的内存泄漏和解决办法 | 开发者说·DTalk

论文阅读:Graph Contrastive Learning with Augmentations

[pit avoidance refers to "difficult"] antd cascader implements new customized functions

Numpy库使用入门

Cesium learning notes

关于数据在内存中的存储下

戴尔电脑cpu温度过高怎么办

Openstack learning notes (I)

.NET in China - What's New in .NET

Scope of ES6 variable
随机推荐
Discuz仿今日头条模板/Discuz新闻资讯商业版GBK模板
OpenStack-----Nova源码分析之创建虚拟机
Pointer, it has to say that the subject
OpenStack学习笔记之-Nova组件深入了解
Win7显示屏幕亮度在哪里可以调节
Mise en place d'un Cluster kubernets avec plusieurs serveurs Cloud
Always maintain epidemic prevention and control and create a safe and stable social environment
Replace element - counter use of content (2)
À propos du stockage des données en mémoire
多台云服务器的 Kubernetes 集群搭建
Rust, the best choice for programmers to start a business?
When the input tag type is number, the input of E, e, -, + is blocked
Implementation of a small book system
打新债是不是不安全
golang键盘输入语句scanln scanf代码示例
关于扫雷的简易实现
API in Nova
Error1822 and error1824 are displayed in the database
Nr-arfcn and channel grid, synchronous grid and GSCN
关于一道教材题的讲解

