> the list goes on, and on, ...
https://code.google.com/p/pentest-bookmarks/
https://code.google.com/p/pentoo/wiki/BookmarksList
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Wed, Jun 25, 2014 at 11:50 PM, Tor Talker wrote:
>
> More to the point, do you have specific concerns regarding the
> Linux/Tor/Apache/Perl stack we are using? We do sanitize error messages to
> prevent Apache from leaking system information, but that's really the only
> special effort
Hi, I made a very basic python script to help people setup their hidden
service. Maybe this could be useful for some people.
https://github.com/Dedal0/Tosc
El jun 26, 2014 3:12 AM, "Mirimir" escribió:
> On 06/26/2014 12:50 AM, Tor Talker wrote:
> > On 25 Jun 2014, at 11:09 PM, Mirimir wrote:
>
On 06/26/2014 12:50 AM, Tor Talker wrote:
> On 25 Jun 2014, at 11:09 PM, Mirimir wrote:
>
>> ... any Tor user can host a hidden service. But few people, even
>> experienced web engineers, know enough to do it securely enough.
>> Also, hidden services are far more vulnerable than Tor users,
>> sim
On Thu, 26 Jun 2014 00:50:29 +, Tor Talker wrote:
...
> > enough to do it securely enough. Also, hidden services are far more
> > vulnerable than Tor users, simply because they serve stuff.
...
> What sort of vulnerabilities would you expect to see?
Problem: Your hidden server can be made to t
On 25 Jun 2014, at 11:09 PM, Mirimir wrote:
> ... any Tor user can host a
> hidden service. But few people, even experienced web engineers, know
> enough to do it securely enough. Also, hidden services are far more
> vulnerable than Tor users, simply because they serve stuff.
OK, I'll bite.
Are