# HiddenServicePort x y:z says to redirect requests on port x to the # address y:z. # This section is just for location-hidden services # Once you have configured a hidden service, you can look at the # contents of the file "./hidden_service/hostname" for the address # to tell people. The hidden services section should now look like this. #HiddenServiceDir /var/lib/tor/hidden_service/ #HiddenServicePort 80 127.0.0.1:80 #HiddenServiceDir /var/lib/tor/hidden_service/ #HiddenServicePort 80 127.0.0.1:80 #HiddenServiceDir /var/lib/tor/other_hidden_service/ #HiddenServicePort 80 127.0.0.1:80 #HiddenServicePort 22 127.0.0.1:22 sudo nano /etc/tor/torrcīy default all Tor client services, relays, and hidden services are commented out and disabled. sudo cp /etc/tor/torrc /etc/tor/OLD.torrc First we will make a backup of this configuration file. We need to edit the Tor configuration file to enable our hidden service. Then install Tor sudo apt-get install tor -keyring The Hidden Service sudo nano /etc/apt/sources.listĪdd the following to the end of the file deb xenial main deb-src xenial main The Tor project maintains their own repository. The Tor packages found in the default repositories for Ubuntu are not reliably updated. If you need assistance setting up a server, please read my tutorial Setting Up a Basic Server with Ubuntu 16.04This tutorial also will assume that you have a basic familiarity with the Dark Web and you already have the Tor Browser. This server should be properly secured for production use. This tutorial is intended for and tested on a remote server running Ubuntu 16.04. We will be using static files for simplicity and security. We will be using Tor Hidden services for this. In this tutorial we will be setting up a server that will host a static site on the Dark Web.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |