$ nmap -A scanme.nmap.org
Starting Nmap 7.40 ( https://nmap.org ) at 2019-09-17 04:51 UTC
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.17s latency).
Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Not shown: 995 closed ports
PORT STATE SERVICE VERSION
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# A web server (ports 80, 22 opened) | |
# on a subnet 10.1.10.0/24 | |
# in a VPC 10.1.0.0/16 | |
# in Region us-east-1a (N Virginia) | |
# Change the source IP in WebSecurityGroup to your testing IP, line 83 and 88 | |
# Change the SSH key to yours on line 98 | |
AWSTemplateFormatVersion: "2010-09-09" | |
Resources: |
I hereby claim:
- I am iamkominn on github.
- I am minn (https://keybase.io/minn) on keybase.
- I have a public key ASACvXlabAFqsIOObq_PWAXHW72cu17GzKeL5R_3IMt2nwo
To claim this, I am signing this object:
To set up a relay server for Magic Wormhole (a secure peer-to-peer file transfer tool), you need to deploy a transit relay component. This relay helps peers establish direct connections when they cannot communicate directly due to NAT/firewalls. Here's how to set it up:
Magic Wormhole’s transit relay is a separate Python-based server. Install it using pip
:
# Install Python and pip (if not already installed)
sudo apt install python3 python3-pip # Debian/Ubuntu
OlderNewer