Private NAS such as Qunhui / cat disk use network penetration cloud for intranet penetration access tutorial

Time:2021-4-18

Demo environment:

Qunhui system

The cat dish

Network cloud through Linux arm version

1: Query device CPU type, this tutorial cat disk uses arm 64 bit CPU, so download Linux arm version.

2: Remote login background management

(1) Turn on Shh function of Qunhui

/

(2) Open the CMD command line, enter the current IP login of the cat disk, the user name and password are the administrator user name and password of Qunhui, and use advanced permissions.

SSH user name @ intranet IP of the device

Enter the password (the password corresponding to the user name)

Sudo -i

Enter the password again (the password corresponding to the user name)

Private NAS such as Qunhui / cat disk use network penetration cloud for intranet penetration access tutorial

001.png

(3) Download client files to NAS

Find the download address of netwear cloud Linux arm version:

http://xiaomy.net/download/li…

Download directly to NAS with WGet command without uploading.

wget http://xiaomy.net/download/li…

Private NAS such as Qunhui / cat disk use network penetration cloud for intranet penetration access tutorial

002.png

(4) Tunnel configuration

The tunnel is configured in the web console, where

Fill in 127.0.0.1 for intranet address

Intranet port filling 5000

Tunnel protocol selection HTTP (s)

Save after setting, as shown in the figure:

Private NAS such as Qunhui / cat disk use network penetration cloud for intranet penetration access tutorial

003.png

Tunnel configuration complete, copy token

(5) In Intranet Linux, we have just downloaded netcloud, now we start it

First, execute the following command to give the network cloud piercing executable permission:

chmod -R 777 ./wyc_linux_arm

(6) Start the task running network in Qunhui

Add user defined script of trigger task

Private NAS such as Qunhui / cat disk use network penetration cloud for intranet penetration access tutorial

004.png

The task name is arbitrarily set, the user account is the default, and the event is the boot event

Private NAS such as Qunhui / cat disk use network penetration cloud for intranet penetration access tutorial

005.png

Enter the code in the task event

cd /root

nohup ./wyc_ linux_ Arm – token = token&

Private NAS such as Qunhui / cat disk use network penetration cloud for intranet penetration access tutorial

006.png

Go back to the control panel and right-click to run in the task column

Private NAS such as Qunhui / cat disk use network penetration cloud for intranet penetration access tutorial

007.png