Anti Ddos Script

    • Anti Ddos Script

      [FONT="Book Antiqua"][COLOR="DeepSkyBlue"][SIZE="2"]Hf and kein Support. Habs mit meinem Botnet getestet. Hält über 25 000 Zombies aus.

      Quellcode

      1. #!/bin/sh
      2. #------------------------------------------------------------------------------
      3. #
      4. # File: SIG-antiDDoS.sh
      5. #
      6. # Compiler: Ruslan Abuzant <ruslan@abuzant.com>
      7. # PS> Collected From Lots Of Sources
      8. # PS> Credits: Real Authors (no idea)
      9. #
      10. # URL: http://www.liteforex.org/
      11. #
      12. # License: GNU GPL (version 2, or any later version).
      13. #
      14. # Configuration.
      15. #------------------------------------------------------------------------------
      16. # For debugging use iptables -v.
      17. IPTABLES="/sbin/iptables"
      18. IP6TABLES="/sbin/ip6tables"
      19. MODPROBE="/sbin/modprobe"
      20. RMMOD="/sbin/rmmod"
      21. ARP="/usr/sbin/arp"
      22. # Logging options.
      23. #------------------------------------------------------------------------------
      24. LOG="LOG --log-level debug --log-tcp-sequence --log-tcp-options"
      25. LOG="$LOG --log-ip-options"
      26. # Defaults for rate limiting
      27. #------------------------------------------------------------------------------
      28. RLIMIT="-m limit --limit 3/s --limit-burst 8"
      29. # Unprivileged ports.
      30. #------------------------------------------------------------------------------
      31. PHIGH="1024:65535"
      32. PSSH="1000:1023"
      33. # Load required kernel modules
      34. #------------------------------------------------------------------------------
      35. $MODPROBE ip_conntrack_ftp
      36. $MODPROBE ip_conntrack_irc
      37. # Mitigate ARP spoofing/poisoning and similar attacks.
      38. #------------------------------------------------------------------------------
      39. # Hardcode static ARP cache entries here
      40. # $ARP -s IP-ADDRESS MAC-ADDRESS
      41. # Kernel configuration.
      42. #------------------------------------------------------------------------------
      43. # Disable IP forwarding.
      44. # On => Off = (reset)
      45. echo 1 > /proc/sys/net/ipv4/ip_forward
      46. echo 0 > /proc/sys/net/ipv4/ip_forward
      47. # Enable IP spoofing protection
      48. for i in /proc/sys/net/ipv4/conf/*/rp_filter; do echo 1 > $i; done
      49. # Protect against SYN flood attacks
      50. echo 1 > /proc/sys/net/ipv4/tcp_syncookies
      51. # Ignore all incoming ICMP echo requests
      52. echo 0 > /proc/sys/net/ipv4/icmp_echo_ignore_all
      53. # Ignore ICMP echo requests to broadcast
      54. echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
      55. # Log packets with impossible addresses.
      56. for i in /proc/sys/net/ipv4/conf/*/log_martians; do echo 1 > $i; done
      57. # Don't log invalid responses to broadcast
      58. echo 1 > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses
      59. # Don't accept or send ICMP redirects.
      60. for i in /proc/sys/net/ipv4/conf/*/accept_redirects; do echo 0 > $i; done
      61. for i in /proc/sys/net/ipv4/conf/*/send_redirects; do echo 0 > $i; done
      62. # Don't accept source routed packets.
      63. for i in /proc/sys/net/ipv4/conf/*/accept_source_route; do echo 0 > $i; done
      64. # Disable multicast routing
      65. for i in /proc/sys/net/ipv4/conf/*/mc_forwarding; do echo 0 > $i; done
      66. # Disable proxy_arp.
      67. for i in /proc/sys/net/ipv4/conf/*/proxy_arp; do echo 0 > $i; done
      68. # Enable secure redirects, i.e. only accept ICMP redirects for gateways
      69. # Helps against MITM attacks.
      70. for i in /proc/sys/net/ipv4/conf/*/secure_redirects; do echo 1 > $i; done
      71. # Disable bootp_relay
      72. for i in /proc/sys/net/ipv4/conf/*/bootp_relay; do echo 0 > $i; done
      73. # Default policies.
      74. #------------------------------------------------------------------------------
      75. # Drop everything by default.
      76. $IPTABLES -P INPUT DROP
      77. $IPTABLES -P FORWARD DROP
      78. $IPTABLES -P OUTPUT DROP
      79. # Set the nat/mangle/raw tables' chains to ACCEPT
      80. $IPTABLES -t nat -P PREROUTING ACCEPT
      81. $IPTABLES -t nat -P OUTPUT ACCEPT
      82. $IPTABLES -t nat -P POSTROUTING ACCEPT
      83. $IPTABLES -t mangle -P PREROUTING ACCEPT
      84. $IPTABLES -t mangle -P INPUT ACCEPT
      85. $IPTABLES -t mangle -P FORWARD ACCEPT
      86. $IPTABLES -t mangle -P OUTPUT ACCEPT
      87. $IPTABLES -t mangle -P POSTROUTING ACCEPT
      88. # Cleanup.
      89. #------------------------------------------------------------------------------
      90. # Delete all
      91. $IPTABLES -F
      92. $IPTABLES -t nat -F
      93. $IPTABLES -t mangle -F
      94. # Delete all
      95. $IPTABLES -X
      96. $IPTABLES -t nat -X
      97. $IPTABLES -t mangle -X
      98. # Zero all packets and counters.
      99. $IPTABLES -Z
      100. $IPTABLES -t nat -Z
      101. $IPTABLES -t mangle -Z
      102. # Completely disable IPv6.
      103. #------------------------------------------------------------------------------
      104. # Block all IPv6 traffic
      105. # If the ip6tables command is available, try to block all IPv6 traffic.
      106. if test -x $IP6TABLES; then
      107. # Set the default policies
      108. # drop everything
      109. $IP6TABLES -P INPUT DROP 2>/dev/null
      110. $IP6TABLES -P FORWARD DROP 2>/dev/null
      111. $IP6TABLES -P OUTPUT DROP 2>/dev/null
      112. # The mangle table can pass everything
      113. $IP6TABLES -t mangle -P PREROUTING ACCEPT 2>/dev/null
      114. $IP6TABLES -t mangle -P INPUT ACCEPT 2>/dev/null
      115. $IP6TABLES -t mangle -P FORWARD ACCEPT 2>/dev/null
      116. $IP6TABLES -t mangle -P OUTPUT ACCEPT 2>/dev/null
      117. $IP6TABLES -t mangle -P POSTROUTING ACCEPT 2>/dev/null
      118. # Delete all rules.
      119. $IP6TABLES -F 2>/dev/null
      120. $IP6TABLES -t mangle -F 2>/dev/null
      121. # Delete all chains.
      122. $IP6TABLES -X 2>/dev/null
      123. $IP6TABLES -t mangle -X 2>/dev/null
      124. # Zero all packets and counters.
      125. $IP6TABLES -Z 2>/dev/null
      126. $IP6TABLES -t mangle -Z 2>/dev/null
      127. fi
      128. # Custom user-defined chains.
      129. #------------------------------------------------------------------------------
      130. # LOG packets, then ACCEPT.
      131. $IPTABLES -N ACCEPTLOG
      132. $IPTABLES -A ACCEPTLOG -j $LOG $RLIMIT --log-prefix "ACCEPT "
      133. $IPTABLES -A ACCEPTLOG -j ACCEPT
      134. # LOG packets, then DROP.
      135. $IPTABLES -N DROPLOG
      136. $IPTABLES -A DROPLOG -j $LOG $RLIMIT --log-prefix "DROP "
      137. $IPTABLES -A DROPLOG -j DROP
      138. # LOG packets, then REJECT.
      139. # TCP packets are rejected with a TCP reset.
      140. $IPTABLES -N REJECTLOG
      141. $IPTABLES -A REJECTLOG -j $LOG $RLIMIT --log-prefix "REJECT "
      142. $IPTABLES -A REJECTLOG -p tcp -j REJECT --reject-with tcp-reset
      143. $IPTABLES -A REJECTLOG -j REJECT
      144. # Only allows RELATED ICMP types
      145. # (destination-unreachable, time-exceeded, and parameter-problem).
      146. # TODO: Rate-limit this traffic?
      147. # TODO: Allow fragmentation-needed?
      148. # TODO: Test.
      149. $IPTABLES -N RELATED_ICMP
      150. $IPTABLES -A RELATED_ICMP -p icmp --icmp-type destination-unreachable -j ACCEPT
      151. $IPTABLES -A RELATED_ICMP -p icmp --icmp-type time-exceeded -j ACCEPT
      152. $IPTABLES -A RELATED_ICMP -p icmp --icmp-type parameter-problem -j ACCEPT
      153. $IPTABLES -A RELATED_ICMP -j DROPLOG
      154. # Make It Even Harder To Multi-PING
      155. $IPTABLES -A INPUT -p icmp -m limit --limit 1/s --limit-burst 2 -j ACCEPT
      156. $IPTABLES -A INPUT -p icmp -m limit --limit 1/s --limit-burst 2 -j LOG --log-prefix PING-DROP:
      157. $IPTABLES -A INPUT -p icmp -j DROP
      158. $IPTABLES -A OUTPUT -p icmp -j ACCEPT
      159. # Only allow the minimally required/recommended parts of ICMP. Block the rest.
      160. #------------------------------------------------------------------------------
      161. # TODO: This section needs a lot of testing!
      162. # First, drop all fragmented ICMP packets (almost always malicious).
      163. $IPTABLES -A INPUT -p icmp --fragment -j DROPLOG
      164. $IPTABLES -A OUTPUT -p icmp --fragment -j DROPLOG
      165. $IPTABLES -A FORWARD -p icmp --fragment -j DROPLOG
      166. # Allow all ESTABLISHED ICMP traffic.
      167. $IPTABLES -A INPUT -p icmp -m state --state ESTABLISHED -j ACCEPT $RLIMIT
      168. $IPTABLES -A OUTPUT -p icmp -m state --state ESTABLISHED -j ACCEPT $RLIMIT
      169. # Allow some parts of the RELATED ICMP traffic, block the rest.
      170. $IPTABLES -A INPUT -p icmp -m state --state RELATED -j RELATED_ICMP $RLIMIT
      171. $IPTABLES -A OUTPUT -p icmp -m state --state RELATED -j RELATED_ICMP $RLIMIT
      172. # Allow incoming ICMP echo requests (ping), but only rate-limited.
      173. $IPTABLES -A INPUT -p icmp --icmp-type echo-request -j ACCEPT $RLIMIT
      174. # Allow outgoing ICMP echo requests (ping), but only rate-limited.
      175. $IPTABLES -A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT $RLIMIT
      176. # Drop any other ICMP traffic.
      177. $IPTABLES -A INPUT -p icmp -j DROPLOG
      178. $IPTABLES -A OUTPUT -p icmp -j DROPLOG
      179. $IPTABLES -A FORWARD -p icmp -j DROPLOG
      180. # Selectively allow certain special types of traffic.
      181. #------------------------------------------------------------------------------
      182. # Allow loopback interface to do anything.
      183. $IPTABLES -A INPUT -i lo -j ACCEPT
      184. $IPTABLES -A OUTPUT -o lo -j ACCEPT
      185. # Allow incoming connections related to existing allowed connections.
      186. $IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
      187. # Allow outgoing connections EXCEPT invalid
      188. $IPTABLES -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
      189. # Miscellaneous.
      190. #------------------------------------------------------------------------------
      191. # We don't care about Milkosoft, Drop SMB/CIFS/etc..
      192. $IPTABLES -A INPUT -p tcp -m multiport --dports 135,137,138,139,445,1433,1434 -j DROP
      193. $IPTABLES -A INPUT -p udp -m multiport --dports 135,137,138,139,445,1433,1434 -j DROP
      194. # Explicitly drop invalid incoming traffic
      195. $IPTABLES -A INPUT -m state --state INVALID -j DROP
      196. # Drop invalid outgoing traffic, too.
      197. $IPTABLES -A OUTPUT -m state --state INVALID -j DROP
      198. # If we would use NAT, INVALID packets would pass - BLOCK them anyways
      199. $IPTABLES -A FORWARD -m state --state INVALID -j DROP
      200. # PORT Scanners (stealth also)
      201. $IPTABLES -A INPUT -m state --state NEW -p tcp --tcp-flags ALL ALL -j DROP
      202. $IPTABLES -A INPUT -m state --state NEW -p tcp --tcp-flags ALL NONE -j DROP
      203. # TODO: Some more anti-spoofing rules? For example:
      204. # $IPTABLES -A INPUT -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP
      205. # $IPTABLES -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
      206. # $IPTABLES -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
      207. $IPTABLES -N SYN_FLOOD
      208. $IPTABLES -A INPUT -p tcp --syn -j SYN_FLOOD
      209. $IPTABLES -A SYN_FLOOD -m limit --limit 2/s --limit-burst 6 -j RETURN
      210. $IPTABLES -A SYN_FLOOD -j DROP
      211. # TODO: Block known-bad IPs (see http://www.dshield.org/top10.php).
      212. # $IPTABLES -A INPUT -s INSERT-BAD-IP-HERE -j DROPLOG
      213. # Drop any traffic from IANA-reserved IPs.
      214. #------------------------------------------------------------------------------
      215. $IPTABLES -A INPUT -s 0.0.0.0/7 -j DROP
      216. $IPTABLES -A INPUT -s 2.0.0.0/8 -j DROP
      217. $IPTABLES -A INPUT -s 5.0.0.0/8 -j DROP
      218. $IPTABLES -A INPUT -s 7.0.0.0/8 -j DROP
      219. $IPTABLES -A INPUT -s 10.0.0.0/8 -j DROP
      220. $IPTABLES -A INPUT -s 23.0.0.0/8 -j DROP
      221. $IPTABLES -A INPUT -s 27.0.0.0/8 -j DROP
      222. $IPTABLES -A INPUT -s 31.0.0.0/8 -j DROP
      223. $IPTABLES -A INPUT -s 36.0.0.0/7 -j DROP
      224. $IPTABLES -A INPUT -s 39.0.0.0/8 -j DROP
      225. $IPTABLES -A INPUT -s 42.0.0.0/8 -j DROP
      226. $IPTABLES -A INPUT -s 49.0.0.0/8 -j DROP
      227. $IPTABLES -A INPUT -s 50.0.0.0/8 -j DROP
      228. $IPTABLES -A INPUT -s 77.0.0.0/8 -j DROP
      229. $IPTABLES -A INPUT -s 78.0.0.0/7 -j DROP
      230. $IPTABLES -A INPUT -s 92.0.0.0/6 -j DROP
      231. $IPTABLES -A INPUT -s 96.0.0.0/4 -j DROP
      232. $IPTABLES -A INPUT -s 112.0.0.0/5 -j DROP
      233. $IPTABLES -A INPUT -s 120.0.0.0/8 -j DROP
      234. $IPTABLES -A INPUT -s 169.254.0.0/16 -j DROP
      235. $IPTABLES -A INPUT -s 172.16.0.0/12 -j DROP
      236. $IPTABLES -A INPUT -s 173.0.0.0/8 -j DROP
      237. $IPTABLES -A INPUT -s 174.0.0.0/7 -j DROP
      238. $IPTABLES -A INPUT -s 176.0.0.0/5 -j DROP
      239. $IPTABLES -A INPUT -s 184.0.0.0/6 -j DROP
      240. $IPTABLES -A INPUT -s 192.0.2.0/24 -j DROP
      241. $IPTABLES -A INPUT -s 197.0.0.0/8 -j DROP
      242. $IPTABLES -A INPUT -s 198.18.0.0/15 -j DROP
      243. $IPTABLES -A INPUT -s 223.0.0.0/8 -j DROP
      244. $IPTABLES -A INPUT -s 224.0.0.0/3 -j DROP
      245. # Selectively allow certain outbound connections, block the rest.
      246. #------------------------------------------------------------------------------
      247. # Allow outgoing DNS requests. Few things will work without this.
      248. $IPTABLES -A OUTPUT -m state --state NEW -p udp --dport 53 -j ACCEPT
      249. $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 53 -j ACCEPT
      250. # Allow outgoing HTTP requests. Unencrypted, use with care.
      251. $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 80 -j ACCEPT
      252. # Allow outgoing HTTPS requests.
      253. $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 443 -j ACCEPT
      254. # Allow outgoing SMTPS requests. Do NOT allow unencrypted SMTP!
      255. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 465 -j ACCEPT
      256. # Allow outgoing "submission" (RFC 2476) requests.
      257. $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 587 -j ACCEPT
      258. # Allow outgoing POP3S requests.
      259. $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 995 -j ACCEPT
      260. # Allow outgoing SSH requests.
      261. $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 22 -j ACCEPT
      262. # Allow outgoing FTP requests. Unencrypted, use with care.
      263. $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 21 -j ACCEPT
      264. # Allow outgoing NNTP requests. Unencrypted, use with care.
      265. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 119 -j ACCEPT
      266. # Allow outgoing NTP requests. Unencrypted, use with care.
      267. # $IPTABLES -A OUTPUT -m state --state NEW -p udp --dport 123 -j ACCEPT
      268. # Allow outgoing IRC requests. Unencrypted, use with care.
      269. # Note: This usually needs the ip_conntrack_irc kernel module.
      270. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 6667 -j ACCEPT
      271. # Allow outgoing requests to various proxies. Unencrypted, use with care.
      272. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 8080 -j ACCEPT
      273. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 8090 -j ACCEPT
      274. # Allow outgoing DHCP requests. Unencrypted, use with care.
      275. # TODO: This is completely untested, I have no idea whether it works!
      276. # TODO: I think this can be tightened a bit more.
      277. $IPTABLES -A OUTPUT -m state --state NEW -p udp --sport 67:68 --dport 67:68 -j ACCEPT
      278. # Allow outgoing CVS requests. Unencrypted, use with care.
      279. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 2401 -j ACCEPT
      280. # Allow outgoing MySQL requests. Unencrypted, use with care.
      281. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 3306 -j ACCEPT
      282. # Allow outgoing SVN requests. Unencrypted, use with care.
      283. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 3690 -j ACCEPT
      284. # Allow outgoing PLESK requests. Unencrypted, use with care.
      285. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 8443 -j ACCEPT
      286. # Allow outgoing Tor (http://tor.eff.org) requests.
      287. # Note: Do _not_ use unencrypted protocols over Tor (sniffing is possible)!
      288. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 9001 -j ACCEPT
      289. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 9002 -j ACCEPT
      290. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 9030 -j ACCEPT
      291. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 9031 -j ACCEPT
      292. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 9090 -j ACCEPT
      293. # $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 9091 -j ACCEPT
      294. # Allow outgoing OpenVPN requests.
      295. $IPTABLES -A OUTPUT -m state --state NEW -p udp --dport 1194 -j ACCEPT
      296. # TODO: ICQ, MSN, GTalk, Skype, Yahoo, etc...
      297. # Selectively allow certain inbound connections, block the rest.
      298. #------------------------------------------------------------------------------
      299. # Allow incoming DNS requests.
      300. $IPTABLES -A INPUT -m state --state NEW -p udp --dport 53 -j ACCEPT
      301. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 53 -j ACCEPT
      302. # Allow incoming HTTP requests.
      303. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 80 -j ACCEPT
      304. # Allow incoming HTTPS requests.
      305. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 443 -j ACCEPT
      306. # Allow incoming POP3 requests.
      307. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 110 -j ACCEPT
      308. # Allow incoming IMAP4 requests.
      309. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 143 -j ACCEPT
      310. # Allow incoming POP3S requests.
      311. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 995 -j ACCEPT
      312. # Allow incoming SMTP requests.
      313. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 25 -j ACCEPT
      314. # Allow incoming SSH requests.
      315. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 22 -j ACCEPT
      316. # Allow incoming FTP requests.
      317. $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 21 -j ACCEPT
      318. # Allow incoming NNTP requests.
      319. # $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 119 -j ACCEPT
      320. # Allow incoming MySQL requests.
      321. # $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 3306 -j ACCEPT
      322. # Allow incoming PLESK requests.
      323. # $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 8843 -j ACCEPT
      324. # Allow incoming BitTorrent requests.
      325. # TODO: Are these already handled by ACCEPTing established/related traffic?
      326. # $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 6881 -j ACCEPT
      327. # $IPTABLES -A INPUT -m state --state NEW -p udp --dport 6881 -j ACCEPT
      328. # Allow incoming nc requests.
      329. # $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 2030 -j ACCEPT
      330. # $IPTABLES -A INPUT -m state --state NEW -p udp --dport 2030 -j ACCEPT
      331. # Explicitly log and reject everything else.
      332. #------------------------------------------------------------------------------
      333. # Use REJECT instead of REJECTLOG if you don't need/want logging.
      334. $IPTABLES -A INPUT -j REJECTLOG
      335. $IPTABLES -A OUTPUT -j REJECTLOG
      336. $IPTABLES -A FORWARD -j REJECTLOG
      337. #------------------------------------------------------------------------------
      338. # Testing the firewall.
      339. #------------------------------------------------------------------------------
      340. # You should check/test that the firewall really works, using
      341. # iptables -vnL, nmap, ping, telnet, ...
      342. # Exit gracefully.
      343. #------------------------------------------------------------------------------
      344. exit 0
      Alles anzeigen
      [/SIZE][/COLOR][/FONT]
    • Werbung zur Unterstützung des Forums ( Bitte AddBlocker deaktivieren )

    • [FONT="Comic Sans MS"][COLOR="Green"][SIZE="2"]

      TwiLight;77276 schrieb:

      IPTables funktioniert doch nur mit Linux, oder täusche ich mich da? o.ô


      Ist richtig, die meisten Webserver basieren jedoch auf Linux, von daher sollte das kein Problem darstellen.
      Explo du Nap, als ob du ein 25k Botnet hättest..... wtf langsam wirds echt nervig mit deinem geilen Cracker-Image... du hast maximal 25 Vics online und laberst ständig Müll....
      [/SIZE][/COLOR][/FONT]