CN110581903A - multilayer intranet penetration method, system and medium - Google Patents
multilayer intranet penetration method, system and medium Download PDFInfo
- Publication number
- CN110581903A CN110581903A CN201910870399.1A CN201910870399A CN110581903A CN 110581903 A CN110581903 A CN 110581903A CN 201910870399 A CN201910870399 A CN 201910870399A CN 110581903 A CN110581903 A CN 110581903A
- Authority
- CN
- China
- Prior art keywords
- intranet
- address
- penetration
- host
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
Abstract
the invention discloses a multi-layer intranet penetration method, which comprises the following steps: installing an intranet penetrating client in an intranet server; a user terminal initiates a request for accessing an intranet terminal through an extranet and sends the request to an intranet penetration server; the intranet penetration server receives the request and sends the request to the intranet penetration client by adopting a network address conversion technology; the intranet penetration client maps the port of the intranet penetration client with the virtual special network port through local network address conversion; the user terminal accesses the intranet terminal through the virtual special network port. The method comprises the steps that information is sent to an intranet penetration server, the intranet penetration server communicates with an intranet penetration client to achieve intranet penetration, local NAT forwarding is conducted through the intranet penetration client, a port of the intranet penetration client is mapped with a virtual special network port, a user terminal can accurately access an intranet terminal, and penetration of a plurality of layers of intranets is achieved.
Description
Technical Field
the invention relates to the technical field of data processing, in particular to a multi-layer intranet penetration method, a multi-layer intranet penetration system and a multi-layer intranet penetration medium.
Background
office networks are generally local area networks (internal networks), and computer nodes of the internal networks and the external networks need to be connected and communicated, so that the problems that the computer nodes cannot be accessed and the internal networks cannot be penetrated are caused sometimes. The intranet penetration method in the prior art cannot realize multilayer network penetration.
disclosure of Invention
in view of the defects in the prior art, embodiments of the present invention provide a method, a system, and a medium for multi-layer intranet penetration, so that multi-layer intranet penetration is implemented, and an intranet terminal can be accessed by an extranet client.
In a first aspect, an embodiment of the present invention provides a multilayer intranet penetration method, including:
Installing an intranet penetrating client in an intranet server;
a user terminal initiates a request for accessing an intranet terminal through an extranet and sends the request to an intranet penetration server;
the intranet penetration server receives the request and sends the request to the intranet penetration client by adopting a network address conversion technology;
The intranet penetration client maps the port of the intranet penetration client with the virtual special network port through local network address conversion;
The user terminal accesses the intranet terminal through the virtual special network port.
Optionally, the specific method of the network address translation technology includes:
the intranet penetration server creates an address mapping table, records an intranet host address, a mapping address and an extranet host address in the address mapping table, and the initial state mapping table is empty;
the method comprises the following steps that an external network host sends a data packet to an internal network server, and an external network host source address and an internal network host target address are recorded in the data packet;
the intranet penetration server side does not find a record of a target address of the intranet host in the address mapping table, creates a record and allocates an intranet port;
Mapping the mapping address with an intranet host target address;
And sending the target address of the modified data packet to the intranet host.
Optionally, the specific method for network address translation further includes: when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
Searching a source address of an external network address corresponding to the mapping address;
And sending the source address of the modified data packet to the external network host.
In a second aspect, the multilayer intranet penetration system provided by the embodiment of the present invention includes a user terminal, an intranet penetration server, an intranet server and an intranet terminal, wherein the intranet server is installed with an intranet penetration client,
the user terminal sends an access request to the intranet terminal through the extranet;
The intranet penetration server receives the request and sends the request to the intranet penetration client by adopting a network address conversion technology;
The intranet penetration client maps the port of the intranet penetration client with the virtual special network port through local network address conversion;
the user terminal accesses the intranet terminal through the virtual special network port.
optionally, the specific method of the network address translation technology further includes: when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
searching a target address of the external network address corresponding to the mapping address;
And sending the target address of the modified data packet to the external network host.
Optionally, the specific method for network address translation further includes: when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
searching a source address of an external network address corresponding to the mapping address;
and sending the source address of the modified data packet to the external network host.
in a third aspect, the present invention also provides a computer-readable storage medium, in which a computer program is stored, the computer program including program instructions, which, when executed by a processor, cause the processor to execute the method described in the above embodiments.
the invention has the beneficial effects that:
According to the multilayer intranet penetration method, the system and the medium, information is sent to the intranet penetration server, the intranet penetration server communicates with the intranet penetration client to achieve intranet penetration, local NAT forwarding is conducted through the intranet penetration client, a port of the intranet penetration client is mapped with a virtual special network port, a user terminal can accurately access the intranet terminal, and penetration of the multilayer intranet is achieved.
Drawings
in order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a flow chart illustrating a multi-layer intranet penetration method according to a first embodiment of the present invention;
Fig. 2 is a block diagram illustrating a multi-layer intranet penetration system according to a second embodiment of the present invention.
Detailed Description
the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
it is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
As shown in fig. 1, a flow chart of a multi-layer intranet penetration method according to a first embodiment of the present invention is shown, and the method includes:
And S1, installing the intranet penetration client in the intranet server.
And S2, the user terminal initiates a request for accessing the intranet terminal through the extranet and sends the request to the intranet penetration service terminal.
and S3, the intranet penetration server receives the request and sends the request to the intranet penetration client by adopting a network address conversion technology.
The specific method for network address translation comprises the following steps: the intranet penetration server creates an address mapping table, records an intranet host address, a mapping address and an extranet host address in the address mapping table, and the initial state mapping table is empty;
the method comprises the following steps that an external network host sends a data packet to an internal network server, and an external network host source address and an internal network host target address are recorded in the data packet;
the intranet penetration server side does not find a record of a target address of the intranet host in the address mapping table, creates a record and allocates an intranet port;
mapping the mapping address with an intranet host target address;
and sending the target address of the modified data packet to the intranet host.
the specific method for network address translation further comprises: when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
searching a source address of an external network address corresponding to the mapping address;
And sending the source address of the modified data packet to the external network host.
and S4, the internal network penetrating client maps the port of the internal network penetrating client with the virtual special network port through local network address conversion.
And S5, the user terminal accesses the intranet terminal through the virtual special network port.
The above technical solution is further described below by using an example. The user terminal of the external network wants to access the internal network terminal through the internal network server. The intranet server always transmits a safe intranet penetrating client, a user terminal of an extranet transmits a request for accessing the intranet terminal to the intranet penetrating server, the intranet penetrating server receives the request transmitted by the user terminal, and the intranet penetrating server and the intranet penetrating client are in information communication by using an NAT (network address translation) technology. The working principle of the NAT is that an internal network penetrating server creates an address mapping table, the recorded content comprises an external network host address, a mapping address and an internal network host address, and the initial state of the mapping table is empty. The extranet host sends a data packet 192.168.0.1: 7000- >158.101.21.10:8000 to the intranet server; if no record with the target address equal to 158.101.21.10:8000 is found in the mapping table, then a record is created and an external network port 9001 is allocated; the target address of the NAT modification data packet is sent to the intranet host computer, 201.11.11.11: 9001- >158.101.21.10: 8000; all subsequent source addresses 192.168.0.1:7000 and target addresses 158.101.21.10:8000 are similarly modified. The intranet server sends the data packet to the extranet host machine in a ratio of 158.101.21.10:8000- >201.11.11.11:9001, the NAT finds that the extranet address mapped by the intranet address 201.11.11.11:9001 is 192.168.0.1:7000, and the NAT modifies the source address of the data packet and then sends the data packet to the extranet host machine in a ratio of 158.101.21.10:8000- >192.168.0.1: 7000. The NAT performs address mapping by modifying the source or destination address of the packet. The NAT modification data packet is transparent to the intranet host, and the intranet host does not need to be configured. At this time, the user terminal cannot access the intranet terminal through the intranet penetration client. Therefore, on the premise that a VPN (virtual private network) connection exists between the intranet penetration client and the intranet terminal, the intranet penetration client performs one-time local NAT (network Address translation) forwarding, a port of the intranet penetration client is mapped with a port of the virtual private network, and the user terminal can correctly access the intranet terminal.
According to the multilayer intranet penetration method provided by the embodiment of the invention, information is sent to the intranet penetration service end, the intranet penetration service end is communicated with the intranet penetration client side to realize intranet penetration, local NAT forwarding is carried out through the intranet penetration client side, a port of the intranet penetration client side is mapped with a virtual special network port, and a user terminal can correctly access an intranet terminal, so that the penetration of a multilayer intranet is realized.
In the first embodiment, a multi-layer intranet penetrating method is provided, and correspondingly, the present application also provides a multi-layer intranet penetrating system. Please refer to fig. 2, which is a block diagram illustrating a multi-layer intranet penetration system according to a second embodiment of the present invention. Since the apparatus embodiments are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for relevant points. The device embodiments described below are merely illustrative.
As shown in fig. 2, a block diagram of a multi-layer intranet penetration system according to a second embodiment of the present invention is shown, where the system includes a user terminal, an intranet penetration server, an intranet server and an intranet terminal, the intranet server is installed with an intranet penetration client, and the user terminal sends an access request to the intranet terminal through an extranet; the intranet penetration server receives the request and sends the request to the intranet penetration client by adopting a network address conversion technology; the intranet penetration client maps the port of the intranet penetration client with the virtual special network port through local network address conversion; the user terminal accesses the intranet terminal through the virtual special network port.
The specific method of the network address translation technology further comprises the following steps: when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
searching a target address of the external network address corresponding to the mapping address;
Sending the target address of the modified data packet to an external network host;
when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
searching a source address of an external network address corresponding to the mapping address;
And sending the source address of the modified data packet to the external network host.
The foregoing is a description of an embodiment of a multi-layer intranet penetration system according to a second embodiment of the present invention.
The multi-layer intranet penetrating system provided by the embodiment of the invention and the multi-layer intranet penetrating method have the same inventive concept and the same beneficial effects, and are not described again here.
an embodiment of a computer-readable storage medium is also provided in the present invention, the computer-readable storage medium storing a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method described in the first embodiment above.
the computer readable storage medium may be an internal storage unit of the terminal described in the foregoing embodiment, for example, a hard disk or a memory of the terminal. The computer readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the terminal. The computer-readable storage medium is used for storing the computer program and other programs and data required by the terminal. The computer readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the terminal and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal and method can be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.
Claims (7)
1. a method of multilayer intranet penetration, comprising:
installing an intranet penetrating client in an intranet server;
A user terminal initiates a request for accessing an intranet terminal through an extranet and sends the request to an intranet penetration server;
The intranet penetration server receives the request and sends the request to the intranet penetration client by adopting a network address conversion technology;
The intranet penetration client maps the port of the intranet penetration client with the virtual special network port through local network address conversion;
The user terminal accesses the intranet terminal through the virtual special network port.
2. The multi-layer intranet penetration method according to claim 1, wherein the specific method of the network address translation technology comprises:
The intranet penetration server creates an address mapping table, records an intranet host address, a mapping address and an extranet host address in the address mapping table, and the initial state mapping table is empty;
the method comprises the following steps that an external network host sends a data packet to an internal network server, and an external network host source address and an internal network host target address are recorded in the data packet;
the intranet penetration server side does not find a record of a target address of the intranet host in the address mapping table, creates a record and allocates an intranet port;
mapping the mapping address with an intranet host target address;
and sending the target address of the modified data packet to the intranet host.
3. The multi-layer intranet penetration method according to claim 2, wherein the specific method for network address translation further comprises: when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
Searching a source address of an external network address corresponding to the mapping address;
and sending the source address of the modified data packet to the external network host.
4. A multi-layer intranet penetration system is characterized by comprising a user terminal, an intranet penetration service terminal, an intranet server and an intranet terminal, wherein the intranet server is provided with an intranet penetration client,
the user terminal sends an access request to the intranet terminal through the extranet;
the intranet penetration server receives the request and sends the request to the intranet penetration client by adopting a network address conversion technology;
the intranet penetration client maps the port of the intranet penetration client with the virtual special network port through local network address conversion;
the user terminal accesses the intranet terminal through the virtual special network port.
5. the system of claim 4, wherein the specific method of network address translation technology further comprises: when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
searching a target address of the external network address corresponding to the mapping address;
And sending the target address of the modified data packet to the external network host.
6. The system of claim 5, wherein the specific method of network address translation further comprises: when the intranet server sends a data packet to the extranet host, an intranet host source address and a mapping address are recorded in the data packet;
Searching a source address of an external network address corresponding to the mapping address;
and sending the source address of the modified data packet to the external network host.
7. A computer-readable storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method according to any of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910870399.1A CN110581903A (en) | 2019-09-16 | 2019-09-16 | multilayer intranet penetration method, system and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910870399.1A CN110581903A (en) | 2019-09-16 | 2019-09-16 | multilayer intranet penetration method, system and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110581903A true CN110581903A (en) | 2019-12-17 |
Family
ID=68811553
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910870399.1A Pending CN110581903A (en) | 2019-09-16 | 2019-09-16 | multilayer intranet penetration method, system and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110581903A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110620783A (en) * | 2019-09-26 | 2019-12-27 | 成都博高信息技术股份有限公司 | Internet serial port transparent transmission communication method based on NAT (network Address translation) intranet penetration |
CN111064742A (en) * | 2019-12-28 | 2020-04-24 | 杭州安恒信息技术股份有限公司 | Method, device and related equipment for realizing intranet access based on network agent |
CN111314481A (en) * | 2020-02-27 | 2020-06-19 | 腾讯科技(深圳)有限公司 | Data transmission method, device, equipment and readable storage medium |
CN111405038A (en) * | 2020-03-13 | 2020-07-10 | 杭州复杂美科技有限公司 | Block chain intranet node connection method, equipment and storage medium |
CN112398847A (en) * | 2020-11-12 | 2021-02-23 | 华侨大学 | Intranet penetration method and system based on TCP Socket and improved heartbeat mechanism |
CN113225409A (en) * | 2021-05-27 | 2021-08-06 | 北京天融信网络安全技术有限公司 | NAT load balancing access method, device and storage medium |
CN113381894A (en) * | 2021-06-10 | 2021-09-10 | 北京小程科技有限公司 | Decentralized data communication system and method for urban in-road parking management |
CN113709163A (en) * | 2021-08-30 | 2021-11-26 | 高维亮 | Method and system for realizing remote operation of computer based on wireless terminal |
CN113784201A (en) * | 2021-10-25 | 2021-12-10 | 康佳集团股份有限公司 | Auxiliary screen device networking processing method and device, intelligent terminal and medium |
CN113824803A (en) * | 2021-11-24 | 2021-12-21 | 飞狐信息技术(天津)有限公司 | Multimedia file sharing method and related device |
CN113949565A (en) * | 2021-10-15 | 2022-01-18 | 上海谋乐网络科技有限公司 | System and method for detecting vulnerability of intranet digital assets |
CN114039757A (en) * | 2021-11-01 | 2022-02-11 | 上海承蓝数据科技有限公司 | Intranet penetration safety management and control method, management and control system and intranet penetration system |
CN114765614A (en) * | 2020-12-31 | 2022-07-19 | 华为技术有限公司 | Method for accessing local area network service equipment and electronic equipment |
CN115022279A (en) * | 2022-06-02 | 2022-09-06 | 京东科技信息技术有限公司 | Intranet penetration method and device |
CN115499411A (en) * | 2022-09-21 | 2022-12-20 | 北京百度网讯科技有限公司 | Network penetration system, method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040088537A1 (en) * | 2002-10-31 | 2004-05-06 | Microsoft Corporation | Method and apparatus for traversing a translation device with a security protocol |
KR100660123B1 (en) * | 2005-10-25 | 2006-12-20 | (주)클립컴 | Vpn server system and vpn terminal for a nat traversal |
US20070058644A1 (en) * | 2005-08-04 | 2007-03-15 | Cisco Technology, Inc. | Service for NAT traversal using IPSEC |
CN101854313A (en) * | 2009-09-27 | 2010-10-06 | 济南维优科技开发有限公司 | Remote access gateway surpassing NAT based on P2P-VPN technology |
CN207517363U (en) * | 2017-07-17 | 2018-06-19 | 河北世窗信息技术股份有限公司 | A kind of digitlization inoculation Outpatient Department data transmission and encryption device |
US20190238503A1 (en) * | 2018-02-01 | 2019-08-01 | National Chiao Tung University | Method for nat traversal in vpn |
-
2019
- 2019-09-16 CN CN201910870399.1A patent/CN110581903A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040088537A1 (en) * | 2002-10-31 | 2004-05-06 | Microsoft Corporation | Method and apparatus for traversing a translation device with a security protocol |
US20070058644A1 (en) * | 2005-08-04 | 2007-03-15 | Cisco Technology, Inc. | Service for NAT traversal using IPSEC |
KR100660123B1 (en) * | 2005-10-25 | 2006-12-20 | (주)클립컴 | Vpn server system and vpn terminal for a nat traversal |
CN101854313A (en) * | 2009-09-27 | 2010-10-06 | 济南维优科技开发有限公司 | Remote access gateway surpassing NAT based on P2P-VPN technology |
CN207517363U (en) * | 2017-07-17 | 2018-06-19 | 河北世窗信息技术股份有限公司 | A kind of digitlization inoculation Outpatient Department data transmission and encryption device |
US20190238503A1 (en) * | 2018-02-01 | 2019-08-01 | National Chiao Tung University | Method for nat traversal in vpn |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110620783B (en) * | 2019-09-26 | 2022-03-25 | 成都博高信息技术股份有限公司 | Internet serial port transparent transmission communication method based on NAT (network Address translation) intranet penetration |
CN110620783A (en) * | 2019-09-26 | 2019-12-27 | 成都博高信息技术股份有限公司 | Internet serial port transparent transmission communication method based on NAT (network Address translation) intranet penetration |
CN111064742A (en) * | 2019-12-28 | 2020-04-24 | 杭州安恒信息技术股份有限公司 | Method, device and related equipment for realizing intranet access based on network agent |
CN111314481A (en) * | 2020-02-27 | 2020-06-19 | 腾讯科技(深圳)有限公司 | Data transmission method, device, equipment and readable storage medium |
CN111314481B (en) * | 2020-02-27 | 2021-08-24 | 腾讯科技(深圳)有限公司 | Data transmission method, device, equipment and readable storage medium |
CN111405038A (en) * | 2020-03-13 | 2020-07-10 | 杭州复杂美科技有限公司 | Block chain intranet node connection method, equipment and storage medium |
CN112398847A (en) * | 2020-11-12 | 2021-02-23 | 华侨大学 | Intranet penetration method and system based on TCP Socket and improved heartbeat mechanism |
CN112398847B (en) * | 2020-11-12 | 2022-11-01 | 华侨大学 | Intranet penetration method and system based on TCP Socket and improved heartbeat mechanism |
CN114765614A (en) * | 2020-12-31 | 2022-07-19 | 华为技术有限公司 | Method for accessing local area network service equipment and electronic equipment |
CN113225409A (en) * | 2021-05-27 | 2021-08-06 | 北京天融信网络安全技术有限公司 | NAT load balancing access method, device and storage medium |
CN113381894A (en) * | 2021-06-10 | 2021-09-10 | 北京小程科技有限公司 | Decentralized data communication system and method for urban in-road parking management |
CN113709163A (en) * | 2021-08-30 | 2021-11-26 | 高维亮 | Method and system for realizing remote operation of computer based on wireless terminal |
CN113949565A (en) * | 2021-10-15 | 2022-01-18 | 上海谋乐网络科技有限公司 | System and method for detecting vulnerability of intranet digital assets |
CN113949565B (en) * | 2021-10-15 | 2023-10-27 | 上海谋乐网络科技有限公司 | System and method for detecting vulnerability of intranet digital assets |
CN113784201A (en) * | 2021-10-25 | 2021-12-10 | 康佳集团股份有限公司 | Auxiliary screen device networking processing method and device, intelligent terminal and medium |
CN114039757A (en) * | 2021-11-01 | 2022-02-11 | 上海承蓝数据科技有限公司 | Intranet penetration safety management and control method, management and control system and intranet penetration system |
CN113824803A (en) * | 2021-11-24 | 2021-12-21 | 飞狐信息技术(天津)有限公司 | Multimedia file sharing method and related device |
CN115022279A (en) * | 2022-06-02 | 2022-09-06 | 京东科技信息技术有限公司 | Intranet penetration method and device |
CN115022279B (en) * | 2022-06-02 | 2024-04-16 | 京东科技信息技术有限公司 | Intranet penetration method and device |
CN115499411A (en) * | 2022-09-21 | 2022-12-20 | 北京百度网讯科技有限公司 | Network penetration system, method and device and electronic equipment |
CN115499411B (en) * | 2022-09-21 | 2023-07-21 | 北京百度网讯科技有限公司 | Network penetration system, method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110581903A (en) | multilayer intranet penetration method, system and medium | |
US6895429B2 (en) | Technique for enabling multiple virtual filers on a single filer to participate in multiple address spaces with overlapping network addresses | |
CN110710168B (en) | Intelligent thread management across isolated network stacks | |
US8819211B2 (en) | Distributed policy service | |
US7370174B2 (en) | Method, system, and program for addressing pages of memory by an I/O device | |
US9665534B2 (en) | Memory deduplication support for remote direct memory access (RDMA) | |
WO2018090290A1 (en) | Mirror image file conversion method and apparatus | |
US20140317336A1 (en) | Local direct storage class memory access | |
EP2472411A1 (en) | SAS expander connection routing techniques | |
CN114385091B (en) | Method and device for realizing network disk drive character, network disk and storage medium | |
EP3608790B1 (en) | Modifying nvme physical region page list pointers and data pointers to facilitate routing of pcie memory requests | |
US20070156763A1 (en) | Storage management system and method thereof | |
US20230014835A1 (en) | Application based egress interface selection | |
US8527586B1 (en) | Multi-protocol global namespace mechanism for network attached storage | |
CN107835268A (en) | A kind of domain name data acquisition method, system and device | |
US20080267193A1 (en) | Technique for enabling network statistics on software partitions | |
CN111240924B (en) | Detection method and system for Socket monitoring of Linux virtual machine | |
CN113992382B (en) | Service data processing method and device, electronic equipment and storage medium | |
CN109960534A (en) | Equipment detection method, device, storage medium and electronic equipment | |
US8326919B1 (en) | Network address translation auto-discovery in data storage networks | |
CN111245944B (en) | Domain name resolution method and device, electronic equipment and storage medium | |
CN114465956B (en) | Method and device for limiting flow rate of virtual machine, electronic equipment and storage medium | |
JP2017215745A (en) | Data processor, data processing method and program | |
CN107544751B (en) | Method and device for remotely accessing disk | |
CN111970250B (en) | Method for identifying account sharing, electronic device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191217 |