[HOME] [DOWNLOAD] [DOCS] [BLOG] [SUPPORT] [TIPS] [ISSUES] [Priority Support]

doubts about how to configure a reverse connection using a onion domain


#1

hello ,

i configured the hidden services in my 2 vm of whonix

i was wondering if there’s a possibility of use the onion domain to receive a reverse connection

i will use it in my vm to practice pentesting

https://blog.addere.ch/2017/07/10/tor-onion-service-in-a-reverse-proxy-environment/

"Because a Tor Onion Service has slightly different properties than regular traffic, a new server listener configuration is recommendable. In nginx a copy of the existing web server to start with is just fine.

These changes are necessary to this new copy:

Add a listen 11337; statement to advice nginx to open this port.
Change the server_name attribute to localhost so nginx listens now on the localhost interface on port 11337.
Remove all TLS settings in this server configuration.

Because we use a copy of the original and working nginx server listener this one also points to the correct web service already and is workable. A configuration reload of nginx is required.

Now you can configure your torrc to point to localhost:11337:

HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:11337

After a restart of the Tor demon the .onion address is generated under /var/lib/tor/hidden_service/hostname"

should i follow this steps ?

thanks a lot