[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor honeypot



On 11/10/16 12:17 PM, Flipchan wrote:
Hi *:)
I have been playing around with some telnet and ssh honeypots lately and caught some malware to learn More about reverse Engineering. And i thought it would be cool to run a Tor honeypot , something that listens on port 9001 and is ofc not connected to the Tor Network.
 So something that listens on port 9001 and logs all incoming request just to see if there is anything scanning for Tor ports and trying to hack them, has this been done? Would be cool to look at the data from that if anyone got a link. I cant be able to find something like this online:/

Try to ensure your research is compatible with
https://blog.torproject.org/blog/ethical-tor-research-guidelines
and the more general
https://blog.torproject.org/blog/tor-social-contract
and ofc if you see anything missing or needlessly restrictive in the guidelines feel free to suggest changes.

If you arent connected to the live Tor network it doesnt seem you would breach anything, but as someone else said the results would not be representative.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk