i configured the hidden services in my 2 vm of whonix
i was wondering if there’s a possibility of use the onion domain to receive a reverse connection
i will use it in my vm to practice pentesting
"Because a Tor Onion Service has slightly different properties than regular traffic, a new server listener configuration is recommendable. In nginx a copy of the existing web server to start with is just fine.
These changes are necessary to this new copy:
Add a listen 11337; statement to advice nginx to open this port. Change the server_name attribute to localhost so nginx listens now on the localhost interface on port 11337. Remove all TLS settings in this server configuration.
Because we use a copy of the original and working nginx server listener this one also points to the correct web service already and is workable. A configuration reload of nginx is required.
Now you can configure your torrc to point to localhost:11337:
HiddenServicePort 80 127.0.0.1:11337
After a restart of the Tor demon the .onion address is generated under /var/lib/tor/hidden_service/hostname"
should i follow this steps ?
thanks a lot