Tagged articles
16 articles
Page 1 of 1
Xiao Liu Lab
Xiao Liu Lab
Nov 27, 2025 · Information Security

Master NPS: Deploy Secure Intranet Penetration with Docker and TLS

This guide explains what NPS (Network Penetration Service) is, why it’s needed, its core advantages, and provides step‑by‑step instructions for deploying the server and client on Linux, Windows, or Docker, configuring TLS, managing tunnels, and troubleshooting common issues.

Docker deploymentNPSTLS encryption
0 likes · 9 min read
Master NPS: Deploy Secure Intranet Penetration with Docker and TLS
Liangxu Linux
Liangxu Linux
Jul 6, 2025 · Operations

Deploy nps: Open‑Source All‑Protocol Network Tunnel Made Simple

This guide introduces the open‑source nps tool, explains its all‑protocol compatibility, low‑resource footprint, and step‑by‑step deployment process for both server and client, enabling seamless cross‑network access for personal, development, and enterprise scenarios.

NPScross-platformdeployment guide
0 likes · 8 min read
Deploy nps: Open‑Source All‑Protocol Network Tunnel Made Simple
Open Source Linux
Open Source Linux
Jun 16, 2025 · Fundamentals

Mastering NAT, NAPT, Intranet Penetration & Proxy Techniques Explained

This article explains the role of NAT and NAPT tables in routing packets between private subnets and the public internet, details how internal network traversal and hole punching work, compares forward and reverse proxy mechanisms, and outlines practical scenarios and differences between these networking techniques.

NAPTNAThole punching
0 likes · 10 min read
Mastering NAT, NAPT, Intranet Penetration & Proxy Techniques Explained
Liangxu Linux
Liangxu Linux
May 1, 2025 · Information Security

Master NPS: Fast, Secure Intranet Penetration and Remote Access Guide

This article introduces the open‑source NPS intranet penetration proxy, outlines its key features such as multi‑protocol support and a powerful web UI, and provides step‑by‑step installation and configuration instructions for Linux and Windows environments.

ProxyRemote accessWindows
0 likes · 5 min read
Master NPS: Fast, Secure Intranet Penetration and Remote Access Guide
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jan 13, 2025 · Operations

Using FRP for Intranet Penetration and Flexible Port Mapping – A Practical Guide

This article explains the limitations of existing intranet penetration tools, presents a custom SSH port‑mapping script, and provides a step‑by‑step tutorial on deploying FRP (frps and frpc), configuring tunnels, managing services with systemd, and verifying port forwarding through the FRP dashboard.

SSH Tunnelfrpintranet penetration
0 likes · 13 min read
Using FRP for Intranet Penetration and Flexible Port Mapping – A Practical Guide
Open Source Tech Hub
Open Source Tech Hub
Mar 5, 2024 · Operations

How to Expose Intranet Web Services with Custom Domains Using frp

This guide explains what frp is, why it’s a strong reverse‑proxy choice, and provides step‑by‑step instructions—including configuration files, port opening, and domain setup—to expose internal web services through custom domains securely.

Custom DomainNetwork ConfigurationOperations
0 likes · 7 min read
How to Expose Intranet Web Services with Custom Domains Using frp
Liangxu Linux
Liangxu Linux
Nov 12, 2023 · Operations

Deploy FRP with Docker: Intranet Penetration Made Simple

This guide explains the fundamentals of FRP, a reverse‑proxy tool for intranet penetration, and provides step‑by‑step instructions to deploy the FRPS server and FRPC client with Docker, configure ports, view logs, access the dashboard, expose local services, and troubleshoot common issues.

DevOpsDockerfrp
0 likes · 14 min read
Deploy FRP with Docker: Intranet Penetration Made Simple
Open Source Linux
Open Source Linux
Aug 18, 2023 · Information Security

Master Intranet Penetration: NPS, FRP, EW, and Ngrok Explained

This guide introduces four popular intranet‑penetration tools—NPS/NPC, FRP, EW, and Ngrok—detailing their core principles, key features, installation steps, configuration files, and practical usage examples for exposing internal services such as web servers, SSH, RDP, and file sharing to the public internet.

NPSewfrp
0 likes · 15 min read
Master Intranet Penetration: NPS, FRP, EW, and Ngrok Explained
Liangxu Linux
Liangxu Linux
Apr 2, 2023 · Fundamentals

How NAT and NAPT Translate Private IPs and Enable Intranet Penetration

This article explains why home networks use private 192.168.x.x addresses, how NAT devices translate private IPs to a single public IP, the detailed SNAT/DNAT processes, the role of ports in NAPT, and how these mechanisms enable inbound connections through techniques like NAT hole punching and intranet penetration.

IP translationNAPTNAT
0 likes · 15 min read
How NAT and NAPT Translate Private IPs and Enable Intranet Penetration
Top Architect
Top Architect
Mar 11, 2023 · Backend Development

Using cpolar for Intranet Penetration to Debug SpringBoot APIs

This tutorial explains how to set up a Java SpringBoot service, install and configure the cpolar intranet‑penetration tool, create HTTP tunnels for local ports, test the public endpoints with Postman, reserve a fixed sub‑domain, and use cpolar's listener for request debugging.

API debuggingBackendJava
0 likes · 7 min read
Using cpolar for Intranet Penetration to Debug SpringBoot APIs
政采云技术
政采云技术
Dec 20, 2022 · Fundamentals

Intranet Penetration: Principles, NAT, and FRP Implementation

This article explains the concepts of public and private IP addresses, NAT techniques, and the principle of intranet penetration, then demonstrates how to set up and analyze the open‑source FRP framework, including configuration files and core Go code for both server and client components.

GoNATNetworking
0 likes · 16 min read
Intranet Penetration: Principles, NAT, and FRP Implementation
Open Source Linux
Open Source Linux
Nov 3, 2021 · Information Security

Master Intranet Penetration: A Practical Guide to nps, frp, EW, and ngrok

This technical guide reviews several popular intranet penetration and proxy tools—including nps, frp, EW, and ngrok—explaining their core principles, key features, installation steps, configuration examples, and advanced options such as encryption, compression, dashboards, and multi‑level port mapping.

NPSfrpinformation security
0 likes · 13 min read
Master Intranet Penetration: A Practical Guide to nps, frp, EW, and ngrok