Update README.md
This commit is contained in:
parent
0c5fb5e451
commit
6ed16750c2
14
README.md
14
README.md
@ -1,7 +1,19 @@
|
|||||||
# pingtunnel
|
# Pingtunnel
|
||||||
pingtunnel是把udp流量伪装成icmp流量进行转发的工具,类似于kcptun。用于突破网络封锁,或是绕过WIFI网络的登陆验证。可以与kcptun很方便的结合使用。
|
pingtunnel是把udp流量伪装成icmp流量进行转发的工具,类似于kcptun。用于突破网络封锁,或是绕过WIFI网络的登陆验证。可以与kcptun很方便的结合使用。
|
||||||
<br />Pingtunnel is a tool that advertises udp traffic as icmp traffic for forwarding, similar to kcptun. Used to break through the network blockade, or to bypass the WIFI network login verification. Can be combined with kcptun very convenient.
|
<br />Pingtunnel is a tool that advertises udp traffic as icmp traffic for forwarding, similar to kcptun. Used to break through the network blockade, or to bypass the WIFI network login verification. Can be combined with kcptun very convenient.
|
||||||
![image](network.png)
|
![image](network.png)
|
||||||
|
# Sample
|
||||||
|
如把本机的:4455的UDP流量转发到www.yourserver.com:4455:For example, the UDP traffic of the machine: 4545 is forwarded to www.yourserver.com:4455:
|
||||||
|
* 在www.yourserver.com的服务器上用root权限运行。Run with root privileges on the server at www.yourserver.com
|
||||||
|
```
|
||||||
|
sudo ./pingtunnel -type server
|
||||||
|
```
|
||||||
|
* 在你本地电脑上用管理员权限运行。Run with administrator privileges on your local computer
|
||||||
|
```
|
||||||
|
pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com:4455
|
||||||
|
```
|
||||||
|
# Usage
|
||||||
|
|
||||||
|
|
||||||
通过伪造ping,把udp流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁UDP流量。
|
通过伪造ping,把udp流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁UDP流量。
|
||||||
By forging ping, the udp traffic is forwarded to the destination server through the remote server. Used to break certain operators to block UDP traffic.
|
By forging ping, the udp traffic is forwarded to the destination server through the remote server. Used to break certain operators to block UDP traffic.
|
||||||
|
Loading…
Reference in New Issue
Block a user