Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to use peanut shells to build servers that break through intranet access

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Two scenes

1. I want to set up a server and deploy a website on my home computer, which can be accessed by everyone on the external network. what should I do?

2. I am a programmer. I have deployed a java project in my local virtual machine. I want my friends to visit me. What should I do?

PS: the situation of being in the same intranet or having a company is excluded here.

A solution.

In the first scenario, we have multiple solutions. For example, we buy our own CVM for deployment, but this is troublesome. You need to purchase domain names, virtual servers, etc., which is a bit difficult for rookies.

In fact, no matter the first kind, the second kind, or even the Nth kind, we can use the famous "peanut shell" to solve it easily. It is easy to install and operate, and the official help is very perfect. "Peanut Shell" software should be very familiar to friends engaged in the network and operation and maintenance, but it may be relatively unfamiliar to other friends. To put it simply, the "peanut shell" extends the virtual machine environment that can only be used for local testing to the external network through the port mapping function.

Today, I will combine a website deployed by myself to talk about how to use "peanut shell" to break through the intranet, so that all users on the external network can visit the website on the server.

Case

Background

A laptop.

The VM virtual machine is installed on the laptop (the virtual machine here is Linux)

Laptops and VM virtual machines can access the network normally

The IP of the VM virtual machine is 192.168.128.xxx (xxx represents any number, and you need to check it for yourself)

Steps

1 download the linux version of the peanut shell client program here at http://hsk.oray.com/download/

Under 2 linux is a rpm package, which is thrown into the virtual machine and installed (using the rpm-ivh command)

3 after success, you will see the scarlet letter prompt of successful and keep flashing (too dazzling)

4 start the service in the virtual machine. I'll take tomcat as an example here, and then use the browser to access the ip+ port in the local laptop.

5 also go to the above address to download the peanut shell windows version of the client (must use the latest version) and install it

6 after starting and registering, click on the domain name list in the following figure, you can already give you a domain name for free, and we can use this domain name in the future.

After 7, click the private network to penetrate and turn on the function. This function itself is free, but requires identity verification, so you have to pay 6 yuan (this is my price at that time). Here, you may think you can still pay, but I think it's OK. This is much cheaper than buying a cloud host, and even if you buy a domain name, it's more than this price. Be content!

8 after enabling private network traversal, go to the page and click add Mapping, as shown below

9 Click to add Mapping

10 after completing the above steps, wait for 5-10 minutes to take effect, and then the public network can access the domain name given to you through peanut shells.

Summary

This is just the tip of the iceberg of peanut shells. More friends who are interested in using more powerful methods can try it on their own.

Peanut shell official website Wechat HSKNEW or search for peanut shell

The official website http://www.oray.com/

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report