Advertisement
Guest User

Untitled

a guest
Aug 22nd, 2017
115
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.89 KB | None | 0 0
  1. [LICENSE]
  2. # License key for FILTER
  3. ID=
  4.  
  5. [SQL]
  6. # SQL server name
  7. SERVER=WIN-DTNDJGOI88P\SQLEXPRESS
  8.  
  9. # SQL login name
  10. LOGIN=sa
  11.  
  12. # SQL login password
  13. PASSWORD=loadmonster1Q
  14.  
  15. # SQL database name
  16. DATABASE=FILTER
  17.  
  18. [GENERAL]
  19. # Server opcodes (Whitelisted)
  20. # Note: Do not touch this unless you know what you are doing, scrub.
  21. OPCODES=0x5000,0x9000,0x2113,0x2001,0x3080,0x706D
  22.  
  23. # Server files
  24. # Note: vSRO188, vSRO274, BR, JSRO is only supported.
  25. FILES=vSRO188
  26.  
  27. # Rules
  28. # RULE(For exploiting, flooding):
  29. # 0 = disabled;
  30. # 1 = continue;
  31. # 2 = disconnect;
  32. # 3 = firewall block;
  33. RULE=2
  34.  
  35. [DOWNLOAD]
  36. #Note: This is only for spoofing download server.
  37. # Download spoofed ip
  38. DOWNLOAD_IP=127.0.0.1
  39.  
  40. # Download spoofed port
  41. DOWNLOAD_PORT=15881
  42.  
  43. [GATEWAY]
  44. #Note: This ports must be forwarded in Windows firewall.
  45. # Gateway remote ip
  46. REMOTE_IP=171.244.18.59
  47.  
  48. # Gateway remote port
  49. REMOTE_PORT=1700
  50.  
  51. # Filter listening IP
  52. LISTEN_IP=10.30.11.33
  53.  
  54. # Filter listening PORT
  55. LISTEN_PORT=15779
  56.  
  57. # Automatic captcha code entry
  58. CAPTCHA_CODE=
  59.  
  60. # Packet protection/second settings
  61. PACKET_COUNT=50
  62.  
  63. # Packet reset time in milliseconds
  64. PACKET_RESET=500
  65.  
  66. # Flood limitation
  67. FLOOD_DETECTION=30
  68.  
  69. # Agent redirect count
  70. AGENT_COUNT=1
  71.  
  72.  
  73. # Foreach agent you add you will do like this:
  74. # http://prntscr.com/cin6xe
  75. # http://prntscr.com/cin6zj
  76. # Dont forgot to set this to higher when more agents:
  77. # http://prntscr.com/cin72w
  78.  
  79. [AGENT_0]
  80. #Note: LISTEN_PORT must be forwarded in Windows firewall.
  81.  
  82. # Filter ip
  83. LISTEN_IP=171.244.18.59
  84.  
  85. # Filter port
  86. LISTEN_PORT=15884
  87.  
  88. # Remote ip
  89. REMOTE_IP=171.244.18.59
  90.  
  91. # Remote port
  92. REMOTE_PORT=1800
  93. --
  94. __
  95. _
  96. -
  97. [SQL]
  98. # SQL server name
  99. SERVER=WIN-DTNDJGOI88P\SQLEXPRESS
  100.  
  101. # SQL login name
  102. LOGIN=sa
  103. dsa123#WDsalpfKMV
  104.  
  105. # SQL login password
  106. PASSWORD=loadmonster1Q
  107.  
  108. # SQL database name
  109. DATABASE=FILTER
  110.  
  111. [GENERAL]
  112. # Server opcodes (Whitelisted)
  113. # Note: Do not touch this unless you know what you are doing, scrub.
  114. OPCODES=0x5000,0x9000,0x2113,0x2001,0x3080,0x706D
  115.  
  116. # Server files
  117. # Note: vSRO188, vSRO274, BR, JSRO is only supported.
  118. FILES=vSRO188
  119.  
  120. # Language
  121. # Note: This is only the language that SendNotices should use.
  122. LANGUAGE=en
  123.  
  124. # Rules
  125. # RULE(For exploiting, flooding):
  126. # 0 = disabled;
  127. # 1 = continue;
  128. # 2 = disconnect;
  129. # 3 = firewall block;
  130. RULE=2
  131.  
  132. [FILTER]
  133. # Packet protection/second settings
  134. PACKET_COUNT=80
  135.  
  136. # Packet reset time in milliseconds
  137. PACKET_RESET=500
  138.  
  139. # Flood limitation
  140. FLOOD_DETECTION=30
  141.  
  142. [AGENT]
  143. #Note: LISTEN_PORT must be forwarded in Windows firewall.
  144.  
  145. # Filter ip
  146. LISTEN_IP=10.30.11.33
  147.  
  148. # Filter port
  149. LISTEN_PORT=15884
  150.  
  151. # Remote ip
  152. REMOTE_IP=171.244.18.59
  153.  
  154. # Remote port
  155. REMOTE_PORT=1800
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement