On 11/10/16 12:17 PM, Flipchan wrote:
Hi *:) I have been playing around with some telnet and ssh honeypots lately and caught some malware to learn More about reverse Engineering. And i thought it would be cool to run a Tor honeypot , something that listens on port 9001 and is ofc not connected to the Tor Network. So something that listens on port 9001 and logs all incoming request just to see if there is anything scanning for Tor ports and trying to hack them, has this been done? Would be cool to look at the data from that if anyone got a link. I cant be able to find something like this online:/
Try to ensure your research is compatible with https://blog.torproject.org/blog/ethical-tor-research-guidelines and the more general https://blog.torproject.org/blog/tor-social-contractand ofc if you see anything missing or needlessly restrictive in the guidelines feel free to suggest changes.
If you arent connected to the live Tor network it doesnt seem you would breach anything, but as someone else said the results would not be representative.
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk