How To Host Your Own .onion Website
by Iceland - Friday March 7, 2025 at 02:14 PM
#1
Before we dive in, let's break down how this magic works. Tor isn't just some fancy VPN. It's a complete network. Your data doesn't just take a single hop through a server, it bounces through multiple encrypted nodes. Each node only knows the step before and after it, The result? Untraceable connections that would make even the most hardcore forensic data analyst rip out there hair.

Now, why the hell would you want to turn your server into an .onion site? Let me break it down for you:
  • Complete anonymity: Your site's physical location? It's almost like it doesn't even exist.
  • Automatic encryption: Every bit of traffic is locked down tight.
  • No exit nodes: Your traffic never leaves the Tor network.
  • Takedown-proof: No domain registrar or hosting provider to harass.

What Can You Host? The Sky's the Limit

Anything that needs to stay off the radar:


Card shops: Sell those garbage Reused cards of yours without worrying about takedowns.
Botnet C&C: Run your zombie army from an untraceable HQ.
Dark markets: Whether it's drugs, guns, or anything else, .onion's got you covered.
Hacking forums: Share techniques, tools, and targets without fear.
Data leaks: Got some juicy ransomware data to leak? darkweb is there for you.




Setting Up Your .onion Site: Let's Get Our Hands Dirty

1. SSH Into Your Server
First things first, connect to your server.
USE a VPN or Tor. Don't be the idiot connecting from your home IP.
That's like robbing a bank then leaving your home address at the scene.


2. Install Tor
Time to get Tor up and running:

Bash:
sudo apt update
sudo apt install tor


3. Configure Tor
Now we need to tell Tor to play nice with our setup. Edit the Tor config file:
Edit `/etc/tor/torrc`:

Bash:
nano /etc/tor/torrc

Bash:
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:80
null


This tells Tor to create a hidden service that forwards to your local web server. It's like setting up a secret tunnel from the dark web to your server.

4. Restart Tor and Get Your .onion Address
Bash:
sudo systemctl restart tor
sudo cat /var/lib/tor/hidden_service/hostname
null


This spits out your .onion address. Guard this with your life. It's your server's new address in the darkweb.

5. Install Apache
If you haven't already, we need a web server to actually serve content. Let's go with Apache:
Bash:
sudo apt update
sudo apt install apache2


6. Configure Apache
Now we need to tell Apache to only listen locally. Edit the config:

Edit /etc/apache2/ports.conf:
Bash:
sudo nano /etc/apache2/ports.conf


Bash:
Listen 80
Change this line to:
Bash:
Listen 127.0.0.1:80
null


This makes sure Apache only responds to requests from Tor, not the open internet.

7. Restart Apache
Bash:
sudo systemctl restart apache2

8. Lock It Down
Time to seal up any possible cracks. Set up a firewall:
Bash:
sudo ufw default deny incoming
sudo ufw allow from 127.0.0.1
sudo ufw enable

This blocks all incoming connections except those from localhost. Your server is now in full paranoid retard mode.

9. Sanitize Your Server
Remove any identifying info from your web pages, server headers, everything. We're talking comments in your HTML, metadata in your images, custom error pages, anything that could point back to you. Don't forget to scrub your Apache logs and config files too. Set your server time to UTC to avoid timezone leaks. If you're using a database, make sure there's no test data with real names or emails lurking in there.

10. Test Your Site

Let's make sure this shit actually works. Edit the default HTML file:
Bash:
sudo nano /var/www/html/index.html


11. Set Permissions and Restart Apache
Make sure your test page is readable:

Bash:
sudo chown www-data:www-data /var/www/html/index.html
sudo chmod 644 /var/www/html/index.html
sudo systemctl restart apache2

12. Access Your .onion Site
Fire up Tor Browser and navigate to your .onion address. If you see your test page, congrats-fucking-lations. You've just hosted your first .onion site


Final Checks: The Real Deal
Alright, you've set up your .onion site. Now it's time for the real-world checks. This isn't some bullshit checklist - these are the steps that'll keep your ass out of the fire.

Verify Your .onion Address: Fire up Tor Browser and visit your site. Make sure the address matches what you've set up. If it doesn't, you've got a serious problem - either a config fuck-up or worse, someone's intercepting your shit.

Content Check: Is everything showing up like it should? If anything's off, even slightly, shut it down and figure out why. Unexplained changes could mean you're compromised.

Access Control: Try hitting your site/server's IP without Tor. You shouldn't be able to see your Apache. If you can, your server's leaking like an asshole. Fix that shit immediately.

Server Headers: Use a tool like curl through Tor to check your HTTP headers. Look for anything that might give away your server type or version. Information disclosure a rookie mistake, but you'd be surprise with the amount of darknet sites getting raided due to this.


Bash:

Copytorsocks curl -I your.onionaddress.onion[/code]


Log Check: SSH into your server and check the logs. Look for any access attempts that shouldn't be there. Unexpected entries could mean someone's probing your defenses.

Connection Security: In Tor Browser, check the security level (the shield icon). Make sure it's set to Safest for your site. If it's not, figure out why and fix it.


Remember, this isn't a one-time deal.
Run through these checks regularly.

In this game, complacency kills. Stay paranoid, stay safe, and maybe you'll avoid becoming another cautionary tale.
And for fuck's sake, if anything looks off, don't ignore it.

Better to be overly cautious than to explain to Tyrone why you're his new cellmate.

Closing Thoughts: You're Not a Pro Yet, So Don't Act Like One


This setup is just baby steps. Don't host anything serious yet without double or triple checking everything. You've got the basics down, but there's a whole world of security measures we haven't even touched.

Stay Paranoid
Hello I write OPSEC guides APOLITICAL
PGP - https://pastebin.com/raw/dqaB9xc1
Iceland  Iceland


Reply
#2
Quote:sudo ufw default deny incoming 
sudo ufw allow from 127.0.0.1
sudo ufw enable

Won't this block the ssh?
Reply
#3
(03-09-2025, 04:00 PM)zeggo Wrote:
Quote:sudo ufw default deny incoming 
sudo ufw allow from 127.0.0.1
sudo ufw enable

Won't this block the ssh?

Only allows connections from tor!
You can skip if your gonna use a vpn
Hello I write OPSEC guides APOLITICAL
PGP - https://pastebin.com/raw/dqaB9xc1
Iceland  Iceland


Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Secure VPS / Website Hosts That I Have Used Iceland 3 419 04-14-2025, 11:19 PM
Last Post: fcsteauabucuresti
  Best Anonymous E-mail and Jabber Services + Onion Links Witty8 7 445 04-12-2025, 09:41 PM
Last Post: mr00robot
  VPN comparison website neddiH 0 941 11-13-2024, 05:17 PM
Last Post: neddiH
  Concept from Live Host + Live VM A-17 1 606 08-01-2024, 03:47 PM
Last Post: Girly

Forum Jump:


 Users browsing this thread: 1 Guest(s)