A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Hosting Hidden Services in I2P: eepSites and SSH (Hacking Illustrated Series InfoSec Tutorial Videos)

Hosting Hidden Services in I2P: eepSites and SSH


Here is another foray into Cipherspace. In this video I'll show how to get your eepSite up and running, along with pointing an HTTP tunnel to another web server besides the build in Jetty, and also how to host SSH inside of the I2P network. Before you watch this video, you may want to check out my videos on

Installing I2P under Windows
Installing I2P under Linux

and you will want to read the article on application level de-anonymizing techniques that can be used against I2P hosted services for some background information.

I apologize for it being somewhat meandering, I was doing the video largely off the cuff. Also be aware that "Hidden Services" is more of Tor's terminology for much the same concept, in I2P you set up "I2P Server Tunnels".


 

Downloads:
http://www.archive.org/download/HostingHiddenServicesInI2pEepsitesAndSsh/i2p-server-tunnel-eepsite-ssh.wmv (Better quality110.1MB)
http://www.archive.org/download/HostingHiddenServicesInI2pEepsitesAndSsh/i2p-server-tunnel-eepsite-ssh_512kb.mp4 (Smaller 32.1MB)

Contents of base32calc.py :

#!/usr/bin/env python
#Based on Duck's script from http://forum.i2p2.de/viewtopic.php?t=4367 with no significant changes
import base64, hashlib, sys
if len(sys.argv) != 2:
print 'Usage: convertkey.py <base64key>'
sys.exit(1)
key = sys.argv[1]
raw_key = base64.b64decode(key, '-~')
hash = hashlib.sha256(raw_key)
base32_hash = base64.b32encode(hash.digest())
print base32_hash.lower().replace('=', '')+'.b32.i2p'

Useful Links:

I2P Home Page:
http://www.i2p2.de/

 

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast