Programmieren: Hilfe & Austausch
01.06.2013 um 21:10@Rho-ny-theta
Habe ich, sieht aber immer noch so aus: :(
Original anzeigen (0,2 MB)
Vllt noch die ini-datei?
Habe ich, sieht aber immer noch so aus: :(

Vllt noch die ini-datei?
@ ECHO OFFusw...........
@ MODE CON COLS=51 LINES=6
REM LAUFWERKBUCHSTABE MIT :\ FÜR DEN USB STICK DER ABGEFRAGT WERDEN SOLL
SET USB_LAUFWERK_PFAD=G:\
SET TNC_LAUFWERK_PFAD=D:\LFDF\
SET TIMER=2
:START
CD %USB_LAUFWERK_PFAD%
REM ERRORLEVEL ABFRAGE WENN 1 DANN IST LAUFWERK NICHT VORHANDEN
IF %ERRORLEVEL%==1 GOTO LABELL3
REM ERRORLEVEL ABFRAGE WENN 0 DANN IST LAUFWERK VORHANDEN
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABELL3
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #= #
ECHO ##################################################
PING -n %TIMER% 127.0.0.1 >NUL
CD %USB_LAUFWERK_PFAD%
IF %ERRORLEVEL%==1 GOTO LABELL4
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABELL4
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #== #
ECHO ##################################################
PING -n %TIMER% 127.0.0.1 >NUL
CD %USB_LAUFWERK_PFAD%
IF %ERRORLEVEL%==1 GOTO LABELL5
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABELL5
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #=== #
ECHO ##################################################
PING -n %TIMER% 127.0.0.1 >NUL
CD %USB_LAUFWERK_PFAD%
IF %ERRORLEVEL%==1 GOTO LABELL6
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABELL6
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #==== #
ECHO ##################################################
PING -n %TIMER% 127.0.0.1 >NUL
CD %USB_LAUFWERK_PFAD%
IF %ERRORLEVEL%==1 GOTO LABELL7
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABELL7
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #===== #
ECHO ##################################################
PING -n %TIMER% 127.0.0.1 >NUL
CD %USB_LAUFWERK_PFAD%
IF %ERRORLEVEL%==1 GOTO LABELL8
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABELL8
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #====== #
ECHO ##################################################
PING -n %TIMER% 127.0.0.1 >NUL
CD %USB_LAUFWERK_PFAD%
IF %ERRORLEVEL%==1 GOTO LABELL9
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABELL9
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #======= #
ECHO ##################################################
PING -n %TIMER% 127.0.0.1 >NUL
CD %USB_LAUFWERK_PFAD%
IF %ERRORLEVEL%==0 GOTO LABEL00
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABEL00
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #======== #
ECHO ##################################################
PING -n %TIMER% 127.0.0.1 >NUL
CD %USB_LAUFWERK_PFAD%
IF %ERRORLEVEL%==0 GOTO LABEL01
IF %ERRORLEVEL%==0 GOTO LABEL0
:LABEL01
CLS
ECHO ##################################################
ECHO # PLEASE MOUNT USB-STICK #
ECHO ##################################################
ECHO #========= #
ECHO ##################################################
[at_user]echo[/at_user] off
title Loading... By El Mano
color 0a
set load=
set/a loadnum=0
:Loading
set load=%load%=
cls
echo.
echo Loading... Please Wait...
echo ----------------------------------------
echo %load%
echo ----------------------------------------
ping localhost -n 2 >nul
set/a loadnum=%loadnum% +1
if %loadnum%==20 goto Done
rem You can set the number of ()'s as whatever you rem want but remember: in your "loading box" you rem need 2 spaces for every () because "()" takes up rem 2 spaces. The above box has 40 spaces, so rem twenty repeats, adding 1 () every repeat.
goto Loading
:Done
echo.
pause
rem *your action here*
rem exit
#!/bin/bash
IPTABLES="/sbin/iptables"
FAIL2BAN="/etc/init.d/fail2ban"
# iptables Firewall-Script for my virtualServer
#
# This script can make your server much more secure,
# because it will only open ports for services you USE
#
# General packet policy is DROP here,
# so be careful that you do not shut yourself out...
# TAKE CARE
#
# fail2ban is also supported and will
# be restarted at the end of the script,
# because the script DELETES all existing rules
# to clean up iptables before
#
# Services allowed:
# FTP (Port 21), SSH (Port 22), Mumur-Server(Mumble, Port 64738),
# HTTP, HTTPS, SMTP, IMAP, POP3
# DNS (Port 53), NTP, NNTP
# Webmin (Port 10000), Submission (Port 587)
#
# See Outgoing and Incoming Rules
#
# For every service you probably need an outgoing and
# incoming rule
# Take care:
# Loopback-Device RULE is ACCEPT by DEFAULT
# Drops SMB/CIFS
#
# And:
# It also drops SPOOFING-Packets
# and PORT scanners
# Modify it to your needs
# If you want logging, use REJECTLOG instead of REJECT at the end
# of the script
# Logging options.
#------------------------------------------------------------------------------
LOG="LOG --log-level debug --log-tcp-sequence --log-tcp-options"
LOG="$LOG --log-ip-options"
# Defaults for rate limiting
#------------------------------------------------------------------------------
RLIMIT="-m limit --limit 3/s --limit-burst 30"
# Default policies.
#------------------------------------------------------------------------------
# Drop everything by default.
$IPTABLES -P INPUT DROP
$IPTABLES -P FORWARD DROP
$IPTABLES -P OUTPUT DROP
# Set the nat/mangle/raw tables' chains to ACCEPT
$IPTABLES -t nat -P PREROUTING ACCEPT
$IPTABLES -t nat -P OUTPUT ACCEPT
$IPTABLES -t nat -P POSTROUTING ACCEPT
$IPTABLES -t mangle -P PREROUTING ACCEPT
$IPTABLES -t mangle -P INPUT ACCEPT
$IPTABLES -t mangle -P FORWARD ACCEPT
$IPTABLES -t mangle -P OUTPUT ACCEPT
$IPTABLES -t mangle -P POSTROUTING ACCEPT
# Cleanup.
#------------------------------------------------------------------------------
# Delete all
$IPTABLES -F
$IPTABLES -t nat -F
$IPTABLES -t mangle -F
# Delete all
$IPTABLES -X
$IPTABLES -t nat -X
$IPTABLES -t mangle -X
# Zero all packets and counters.
$IPTABLES -Z
$IPTABLES -t nat -Z
$IPTABLES -t mangle -Z
# Custom user-defined chains.
#------------------------------------------------------------------------------
# LOG packets, then ACCEPT.
$IPTABLES -N ACCEPTLOG
$IPTABLES -A ACCEPTLOG -j $LOG $RLIMIT --log-prefix "ACCEPT "
$IPTABLES -A ACCEPTLOG -j ACCEPT
# LOG packets, then DROP.
$IPTABLES -N DROPLOG
$IPTABLES -A DROPLOG -j $LOG $RLIMIT --log-prefix "DROP "
$IPTABLES -A DROPLOG -j DROP
# LOG packets, then REJECT.
# TCP packets are rejected with a TCP reset.
$IPTABLES -N REJECTLOG
$IPTABLES -A REJECTLOG -j $LOG $RLIMIT --log-prefix "REJECT "
$IPTABLES -A REJECTLOG -p tcp -j REJECT --reject-with tcp-reset
$IPTABLES -A REJECTLOG -j REJECT
# Only allows RELATED ICMP types
# (destination-unreachable, time-exceeded, and parameter-problem).
# TODO: Rate-limit this traffic?
# TODO: Allow fragmentation-needed?
# TODO: Test.
$IPTABLES -N RELATED_ICMP
$IPTABLES -A RELATED_ICMP -p icmp --icmp-type destination-unreachable -j ACCEPT
$IPTABLES -A RELATED_ICMP -p icmp --icmp-type time-exceeded -j ACCEPT
$IPTABLES -A RELATED_ICMP -p icmp --icmp-type parameter-problem -j ACCEPT
$IPTABLES -A RELATED_ICMP -j DROPLOG
# Make It Even Harder To Multi-PING
$IPTABLES -A INPUT -p icmp -m limit --limit 1/s --limit-burst 2 -j ACCEPT
$IPTABLES -A INPUT -p icmp -m limit --limit 1/s --limit-burst 2 -j LOG --log-prefix PING-DROP:
$IPTABLES -A INPUT -p icmp -j DROP
$IPTABLES -A OUTPUT -p icmp -j ACCEPT
# Only allow the minimally required/recommended parts of ICMP. Block the rest.
#------------------------------------------------------------------------------
# First, drop all fragmented ICMP packets (almost always malicious).
$IPTABLES -A INPUT -p icmp --fragment -j DROPLOG
$IPTABLES -A OUTPUT -p icmp --fragment -j DROPLOG
$IPTABLES -A FORWARD -p icmp --fragment -j DROPLOG
# Allow all ESTABLISHED ICMP traffic.
$IPTABLES -A INPUT -p icmp -m state --state ESTABLISHED -j ACCEPT $RLIMIT
$IPTABLES -A OUTPUT -p icmp -m state --state ESTABLISHED -j ACCEPT $RLIMIT
# Allow some parts of the RELATED ICMP traffic, block the rest.
$IPTABLES -A INPUT -p icmp -m state --state RELATED -j RELATED_ICMP $RLIMIT
$IPTABLES -A OUTPUT -p icmp -m state --state RELATED -j RELATED_ICMP $RLIMIT
# Allow incoming ICMP echo requests (ping), but only rate-limited.
$IPTABLES -A INPUT -p icmp --icmp-type echo-request -j ACCEPT $RLIMIT
# Allow outgoing ICMP echo requests (ping), but only rate-limited.
$IPTABLES -A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT $RLIMIT
# Drop any other ICMP traffic.
$IPTABLES -A INPUT -p icmp -j DROPLOG
$IPTABLES -A OUTPUT -p icmp -j DROPLOG
$IPTABLES -A FORWARD -p icmp -j DROPLOG
# Selectively allow certain special types of traffic.
#------------------------------------------------------------------------------
# Allow loopback interface to do anything.
$IPTABLES -A INPUT -i lo -j ACCEPT
$IPTABLES -A OUTPUT -o lo -j ACCEPT
# Allow incoming connections related to existing allowed connections.
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
# Allow outgoing connections EXCEPT invalid
$IPTABLES -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
# Miscellaneous.
#------------------------------------------------------------------------------
# We don't care about Milkosoft, Drop SMB/CIFS/etc..
$IPTABLES -A INPUT -p tcp -m multiport --dports 135,137,138,139,445,1433,1434 -j DROP
$IPTABLES -A INPUT -p udp -m multiport --dports 135,137,138,139,445,1433,1434 -j DROP
# Explicitly drop invalid incoming traffic
$IPTABLES -A INPUT -m state --state INVALID -j DROP
# Drop invalid outgoing traffic, too.
$IPTABLES -A OUTPUT -m state --state INVALID -j DROP
# If we would use NAT, INVALID packets would pass - BLOCK them anyways
$IPTABLES -A FORWARD -m state --state INVALID -j DROP
# Disable PORT Scanners (stealth also)
$IPTABLES -A INPUT -m state --state NEW -p tcp --tcp-flags ALL ALL -j DROP
$IPTABLES -A INPUT -m state --state NEW -p tcp --tcp-flags ALL NONE -j DROP
# TODO: Some more anti-spoofing rules? For example:
$IPTABLES -A INPUT -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP
$IPTABLES -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
$IPTABLES -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
$IPTABLES -N SYN_FLOOD
$IPTABLES -A INPUT -p tcp --syn -j SYN_FLOOD
$IPTABLES -A SYN_FLOOD -m limit --limit 2/s --limit-burst 6 -j RETURN
$IPTABLES -A SYN_FLOOD -j DROP
# Selectively allow certain outbound connections, block the rest.
#------------------------------------------------------------------------------
# Allow outgoing DNS requests. Few things will work without this.
$IPTABLES -A OUTPUT -m state --state NEW -p udp --dport 53 -j ACCEPT
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 53 -j ACCEPT
# Allow outgoing HTTP requests. Unencrypted, use with care.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 80 -j ACCEPT
# Allow outgoing HTTPS requests.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 443 -j ACCEPT
# Allow outgoing Mumble-Server requests.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 64738 -j ACCEPT
$IPTABLES -A OUTPUT -m state --state NEW -p udp --dport 64738 -j ACCEPT
# Allow outgoing SMTP requests.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 25 -j ACCEPT
# Allow outgoing SMTPS requests.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 465 -j ACCEPT
# Allow outgoing "submission" (RFC 2476) requests.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 587 -j ACCEPT
# Allow outgoing POP3S requests.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 995 -j ACCEPT
# Allow outgoing SSH requests.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 22 -j ACCEPT
# Allow outgoing Webmin requests.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 10000 -j ACCEPT
# Allow outgoing FTP requests. Unencrypted, use with care.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 21 -j ACCEPT
# Allow outgoing NNTP requests. Unencrypted, use with care.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 119 -j ACCEPT
# Allow outgoing NTP requests. Unencrypted, use with care.
$IPTABLES -A OUTPUT -m state --state NEW -p udp --dport 123 -j ACCEPT
# Allow outgoing CVS requests. Unencrypted, use with care.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 2401 -j ACCEPT
# Allow outgoing MySQL requests. Unencrypted, use with care.
$IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 3306 -j ACCEPT
# Allow outgoing SVN requests. Unencrypted, use with care.
# $IPTABLES -A OUTPUT -m state --state NEW -p tcp --dport 3690 -j ACCEPT
# Selectively allow certain inbound connections, block the rest.
#------------------------------------------------------------------------------
# Allow incoming DNS requests.
$IPTABLES -A INPUT -m state --state NEW -p udp --dport 53 -j ACCEPT
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 53 -j ACCEPT
# Allow incoming HTTP requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 80 -j ACCEPT
# Allow incoming HTTPS requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 443 -j ACCEPT
# Allow incoming POP3 requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 110 -j ACCEPT
# Allow incoming IMAP4 requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 143 -j ACCEPT
# Allow incoming POP3S requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 995 -j ACCEPT
# Allow incoming SMTP requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 25 -j ACCEPT
# Allow incoming SSH requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 22 -j ACCEPT
# Allow incoming FTP requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 21 -j ACCEPT
# Allow incoming NNTP requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 119 -j ACCEPT
# Allow incoming MySQL requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 3306 -j ACCEPT
# Allow incoming Webmin requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 10000 -j ACCEPT
# Allow incoming Mumble-Server Requests.
$IPTABLES -A INPUT -m state --state NEW -p tcp --dport 64738 -j ACCEPT
$IPTABLES -A INPUT -m state --state NEW -p udp --dport 64738 -j ACCEPT
# Allow incoming nc requests.
# $IPTABLES -A INPUT -m state --state NEW -p tcp --dport 2030 -j ACCEPT
# $IPTABLES -A INPUT -m state --state NEW -p udp --dport 2030 -j ACCEPT
# Explicitly log and reject everything else.
#------------------------------------------------------------------------------
# Use REJECT instead of REJECTLOG if you don't need/want logging.
$IPTABLES -A INPUT -j REJECT
$IPTABLES -A OUTPUT -j REJECT
$IPTABLES -A FORWARD -j REJECT
$FAIL2BAN restart
# Exit gracefully.
#------------------------------------------------------------------------------
exit 0