Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [LICENSE]
- # License key for FILTER
- ID=
- [SQL]
- # SQL server name
- SERVER=WIN-DTNDJGOI88P\SQLEXPRESS
- # SQL login name
- LOGIN=sa
- # SQL login password
- PASSWORD=loadmonster1Q
- # SQL database name
- DATABASE=FILTER
- [GENERAL]
- # Server opcodes (Whitelisted)
- # Note: Do not touch this unless you know what you are doing, scrub.
- OPCODES=0x5000,0x9000,0x2113,0x2001,0x3080,0x706D
- # Server files
- # Note: vSRO188, vSRO274, BR, JSRO is only supported.
- FILES=vSRO188
- # Rules
- # RULE(For exploiting, flooding):
- # 0 = disabled;
- # 1 = continue;
- # 2 = disconnect;
- # 3 = firewall block;
- RULE=2
- [DOWNLOAD]
- #Note: This is only for spoofing download server.
- # Download spoofed ip
- DOWNLOAD_IP=127.0.0.1
- # Download spoofed port
- DOWNLOAD_PORT=15881
- [GATEWAY]
- #Note: This ports must be forwarded in Windows firewall.
- # Gateway remote ip
- REMOTE_IP=171.244.18.59
- # Gateway remote port
- REMOTE_PORT=1700
- # Filter listening IP
- LISTEN_IP=10.30.11.33
- # Filter listening PORT
- LISTEN_PORT=15779
- # Automatic captcha code entry
- CAPTCHA_CODE=
- # Packet protection/second settings
- PACKET_COUNT=50
- # Packet reset time in milliseconds
- PACKET_RESET=500
- # Flood limitation
- FLOOD_DETECTION=30
- # Agent redirect count
- AGENT_COUNT=1
- # Foreach agent you add you will do like this:
- # http://prntscr.com/cin6xe
- # http://prntscr.com/cin6zj
- # Dont forgot to set this to higher when more agents:
- # http://prntscr.com/cin72w
- [AGENT_0]
- #Note: LISTEN_PORT must be forwarded in Windows firewall.
- # Filter ip
- LISTEN_IP=171.244.18.59
- # Filter port
- LISTEN_PORT=15884
- # Remote ip
- REMOTE_IP=171.244.18.59
- # Remote port
- REMOTE_PORT=1800
- --
- __
- _
- -
- [SQL]
- # SQL server name
- SERVER=WIN-DTNDJGOI88P\SQLEXPRESS
- # SQL login name
- LOGIN=sa
- dsa123#WDsalpfKMV
- # SQL login password
- PASSWORD=loadmonster1Q
- # SQL database name
- DATABASE=FILTER
- [GENERAL]
- # Server opcodes (Whitelisted)
- # Note: Do not touch this unless you know what you are doing, scrub.
- OPCODES=0x5000,0x9000,0x2113,0x2001,0x3080,0x706D
- # Server files
- # Note: vSRO188, vSRO274, BR, JSRO is only supported.
- FILES=vSRO188
- # Language
- # Note: This is only the language that SendNotices should use.
- LANGUAGE=en
- # Rules
- # RULE(For exploiting, flooding):
- # 0 = disabled;
- # 1 = continue;
- # 2 = disconnect;
- # 3 = firewall block;
- RULE=2
- [FILTER]
- # Packet protection/second settings
- PACKET_COUNT=80
- # Packet reset time in milliseconds
- PACKET_RESET=500
- # Flood limitation
- FLOOD_DETECTION=30
- [AGENT]
- #Note: LISTEN_PORT must be forwarded in Windows firewall.
- # Filter ip
- LISTEN_IP=10.30.11.33
- # Filter port
- LISTEN_PORT=15884
- # Remote ip
- REMOTE_IP=171.244.18.59
- # Remote port
- REMOTE_PORT=1800
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement