[Intranet Security – Tunneling] Intranet Penetration_Spp on line (full duplex communication)

Time:2023-11-10

catalogs

Spp (special protocols on line)

1. Brief description:

2. Usage:

1. Preparation

2. Server

3. Clients

4、cs、msf


Spp (special protocols on line)

1. Brief description:

1)Supported protocols:tcp, udp, rudp (reliable udp), ricmp (reliable icmp), rhttp (reliable http), kcp, quic


2)Type of support:Two-way proxy, socks5 forward proxy, socks5 reverse proxy


3)External agency agreementsandinternal forwarding protocolcanfree combination


4) Shadowsocks supportplug-in (software component),spp-shadowsocks-plugin,spp-shadowsocks-plugin-android

GitHub – esrrhs/spp-shadowsocks-plugin: spp shadowsocks pluginspp shadowsocks plugin. Contribute to esrrhs/spp-shadowsocks-plugin development by creating an account on GitHub.[Intranet Security - Tunneling] Intranet Penetration_Spp on line (full duplex communication)https://github.com/esrrhs/spp-shadowsocks-plugin


5)Tools:Releases · esrrhs/spp (github.com)[Intranet Security - Tunneling] Intranet Penetration_Spp on line (full duplex communication)https://github.com/esrrhs/spp/releases/


6)Schematic:

[Intranet Security - Tunneling] Intranet Penetration_Spp on line (full duplex communication)

(Image from GitHub.Releases · esrrhs/spp (github.com)) 


7)Personal opinion:

Simple to use: One command each for the server and the client to establish a connection.

full duplex communication: There is no distinction between server and client for the tool, so you can specify the server and client directly in the command.



2. Usage:

1. Preparation

Because it’sfull duplex communication(There is no client-side or server-side version of the tool, just look for the version that corresponds to the server and the client)

[Intranet Security - Tunneling] Intranet Penetration_Spp on line (full duplex communication)

2. Server

1) Method I:Start the server:

Assuming the server IP is www.server.com and listening on port 8888

Specify the type asserver(server-side) with the protocoltcp protocolListeningports8888

# ./spp -type server -proto tcp -listen :8888

2) Method II:Free combination of methods:

It is also possible to listen simultaneously with other types of ports and protocols

-prtoThree protocols and ports are connected to each of them, and they are listening at the same time.

# ./spp -type server -proto tcp -listen :8888 -proto rudp -listen :9999 -proto ricmp -listen 0.0.0.0

3) Method III:Other methods:You can also use Docker

(This one’s a little more complicated.)

# docker run --name my-server -d --restart=always --network host esrrhs/spp ./spp -proto tcp -listen :8888

3. Clients

1) Method I:Enable TCP Forwarding Agent

(Positive)Mapping port 8080 of www.server.com to local 8080 makes accessing local 8080 equivalent to accessing www.server.com 8080

# ./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto tcp

2) Method II:Starting the TCP Reverse Proxy

(Reverse)Mapping local 8080 to port 8080 of www.server.com, accessing www.server.com 8080 is equivalent to accessing local 8080

# ./spp -name "test" -type reverse_proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto tcp

3) Method III:Starting TCP Positive Socks5 Agent

(Positive)Enable socks5 protocol on local port 8080 to access the network in the server through the server

# ./spp -name "test" -type socks5_client -server www.server.com:8888 -fromaddr :8080 -proxyproto tcp

4) Method four:Start tcp reverse socks5 proxy

(Reverse)Enable the socks5 protocol on port 8080 of www.server.com to access the network on the client through a client

# ./spp -name "test" -type reverse_socks5_client -server www.server.com:8888 -fromaddr :8080 -proxyproto tcp

5)Other agency agreements:

Simply modify the proxyProto parameter on the client side

# Proxy UDP protocol
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto udp

# Proxy rudp protocol
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8081 -toaddr :8081 -proxyproto rudp

# Proxy ricmp protocol
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8082 -toaddr :8082 -proxyproto ricmp

# Simultaneous use of UDP, rudp, ricmp protocols
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto udp -fromaddr :8081 -toaddr :8081 -proxyproto rudp -fromaddr :8082 -toaddr :8082 -proxyproto ricmp

6) between the client and the serverinternal communication

can also be modified to other agreements.Automatic conversion of external and internal protocols

# Proxy tcp protocol, internally forwarded with rudp protocol
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto tcp -proto rudp


# Proxy tcp protocol, internally forwarded with ricmp protocol
./spp -name "test" -type proxy_client -server www.server.com -fromaddr :8080 -toaddr :8080 -proxyproto tcp -proto ricmp


# Proxy udp protocol, internally forwarded using tcp protocol
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto udp -proto tcp


# Proxy udp protocol, internal forwarding with kcp protocol
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto udp -proto kcp


# Proxy tcp protocol, internally forwarded with quic protocol
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto tcp -proto quic


# proxy tcp protocol, internally forwarded using rhttp protocol
./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto tcp -proto rhttp

7) Other methods:docker

# docker run --name my-client -d --restart=always --network host esrrhs/spp ./spp -name "test" -type proxy_client -server www.server.com:8888 -fromaddr :8080 -toaddr :8080 -proxyproto tcp

4、cs、msf

Generate Listening Backdoor Listening


Usage Source Developer:

esrrhs/spp: a simple but powerful proxy (github.com)[Intranet Security - Tunneling] Intranet Penetration_Spp on line (full duplex communication)https://github.com/esrrhs/spp

Recommended Today

uniapp and applet set tabBar and show and hide tabBar

(1) Set the tabBar: uni.setTabberItem({}); wx.setTabberItem({}); indexnumberisWhich item of the tabBar, counting from the left, is indexed from 0.textstringnoButton text on tabiconPathstringnoImage PathselectedIconPathstringnoImage path when selectedpagePathstringnoPage absolute pathvisiblebooleannotab Whether to display uni.setTabBarItem({ index: 0, text: ‘text’, iconPath: ‘/path/to/iconPath’, selectedIconPath: ‘/path/to/selectedIconPath’, pagePath: ‘pages/home/home’ }) wx.setTabBarItem({ index: 0, text: ‘text’, iconPath: ‘/path/to/iconPath’, selectedIconPath: ‘/path/to/selectedIconPath’, pagePath: ‘pages/home/home’ }) […]