doubts about how to configure a reverse connection using a onion domain

hello ,

i configured the hidden services in my 2 vm of whonix

i was wondering if there’s a possibility of use the onion domain to receive a reverse connection

i will use it in my vm to practice pentesting

"Because a Tor Onion Service has slightly different properties than regular traffic, a new server listener configuration is recommendable. In nginx a copy of the existing web server to start with is just fine.

These changes are necessary to this new copy:

Add a listen 11337; statement to advice nginx to open this port.
Change the server_name attribute to localhost so nginx listens now on the localhost interface on port 11337.
Remove all TLS settings in this server configuration.

Because we use a copy of the original and working nginx server listener this one also points to the correct web service already and is workable. A configuration reload of nginx is required.

Now you can configure your torrc to point to localhost:11337:

HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80

After a restart of the Tor demon the .onion address is generated under /var/lib/tor/hidden_service/hostname"

should i follow this steps ?

thanks a lot