How to penetrate the intranet of openwrt in N1 box

Time:2021-1-20

Openwrt’s intranet penetration through N1 box with net cloud

Soft router [](http://neiwangchuantou.cn/arc…Chapter link)

N1 (already swiped into arbian) uses docker to create openwrt container as side route.

My intranet IP information [](http://neiwangchuantou.cn/arc…Chapter link)

Intranet IP varies from person to person. Here are my own settings

Armbian:192.168.123.2

Openwrt:192.168.123.10

Ideas [](http://neiwangchuantou.cn/arc…Chapter link)

The network cloud penetration is deployed in the armbian of N1 to penetrate the intranet of 192.168.123.10:80.

Why don’t we just deploy cloud piercing on openwrt?

Because openwrt under the N1 box is often updated, if it is deployed on openwrt, it is too cumbersome to reload the network after each update.

However, the Armen system of N1 box has low update frequency and more stable operation. Through accessing openwrt in N1 intranet to complete network cloud penetration deployment, the network cloud penetration service can run stably for a long time

1 – open online cloud service [](http://neiwangchuantou.cn/arc…Chapter link)

1.1 – accessWorking platform of network cloud penetration, selectTunnel opening, purchase according to the demand and complete the payment.

My discount code:fzyhpv

How to penetrate the intranet of openwrt in N1 boxbuy.png

2 – configure tunnel [](http://neiwangchuantou.cn/arc…Chapter link)

2.1 – accessWorking platform of network cloud penetration-Tunnel opening / management

Edit tunnel:

Intranet address: fill in the address of openwrt in Intranet

Intranet port: 80(used to access the openwrt background control panel)

Penetration protocol: TCP

How to penetrate the intranet of openwrt in N1 boxedit.png

2.2 – copy token, where token is5p6cypqw

How to penetrate the intranet of openwrt in N1 boxpass.png

3 – install net cloud piercing in N1 box [](http://neiwangchuantou.cn/arc…Chapter link)

3.1 – SSH login intranet: arbian:ssh [email protected]

3.2 – Download cloud wear Linux arm version:curl -O http://xiaomy.net/download/linux/wyc_linux_arm

3.3 – give the program executable permission:chmod -R 777 ./wyc_linux_arm

How to penetrate the intranet of openwrt in N1 boxdownload.png

4 – start network cloud penetration service [](http://neiwangchuantou.cn/arc…Chapter link)

4.1 – login to the intranet via SSHssh [email protected]

4.2 – start cloud piercing

There are two ways to start cloud piercing

Method 1: input token after running network cloud penetration(http://neiwangchuantou.cn/arc…Chapter link)

Execute the order./wyc_linux_arm

Enter the token according to the prompt

Method 2: fill in the token in the start command(http://neiwangchuantou.cn/arc…Chapter link)

Execute the order./wyc_ linux_ Arm - token = token number

See “login succeeded, now you can visit” xxxx.xiaomy.net:12345 , which will be directly mapped to your local 192.168.123.10:80 · “

Indicates that the penetration has been successful. You can enter the openwrt management background through the prompted domain name.

How to penetrate the intranet of openwrt in N1 box27A50F14-6F8E-4325-B2C2-64824D5D3CBE

At this time, the network cloud service runs in the front desk of armbian and interrupts the SSH connection orctrl + cWill terminate the intranet penetration process. If you want the penetration service to run stably, you need to set the service to run in the background

5 – background operation network cloud service [](http://neiwangchuantou.cn/arc…Chapter link)

5.1 – background start command:nohup /root/wyc_ linux_ Arm - token = token >/ wycout.txt 2>&1 &

5.2 – view startup information:cat ./wycout.txt

5.3 – view network cloud piercing process ID:ps -ef | grep wyc_linux_arm

How to penetrate the intranet of openwrt in N1 boxbk.png

Stop background service:Kill process ID

Just now our process ID is15537, corresponding, command:kill 15537

6 – set the network cloud to boot automatically and run in the background [](http://neiwangchuantou.cn/arc…Chapter link)

6.1 – enter crontab toolcrontab -e

6.2 – add this command at the bottom (please fill in the token yourself)

@reboot nohup /root/wyc_ linux_ Arm - token = token >/ wycout.txt 2>&1 &

After filling in, save the settings and exit

Conclusion [](http://neiwangchuantou.cn/arc…Chapter link)

Through the above settings, you can achieve stable intranet penetration of your router background.