- Nov 2, 2015
- 997
- 723
- 161
For the hosts file, what I noticed that happens is that when I reboot the system it will place all the hosts on the same line which might annoy the check...The hosts file check actually counts a certain number of entries of "TeamSpeak" in the hosts file. So if you removed some unnecessary ones it will say that. It's only a very basic check. Do you run the latest version of the script (v.0.5.16)? When you apply the antic cack, does it say something like:"two new iptable rules applied."?
AS for the anti-crack, it does that everytime :
#######################################################
# TS3 Server crack script 0516 by Supervisor #
# Join our community at r4p3.net #
#######################################################
Checking for updates... ...script is up to date!
#######################################################
# 1) Install Crack #
# 2) Update from 3.0.11.X to 3.0.11.4 #
# 3) Anticrash scripts #
# 4) Autostart scripts #
# 5) AntiCrack #
# 6) Status #
# 7) Debug #
# 8) Show special credits #
# 9) Show changelog + infos #
# CTRL-C to escape the script #
#######################################################
Answer: 5
#######################################################
# Note: Your server will appear as #
# "not cracked" to CrackCheckers if activated. #
# 1) Activate AntiCrack #
# 2) Deactivate AntiCrack #
#######################################################
Answer: 1
# Generated by iptables-save v1.4.21 on Mon Nov 16 11:03:08 2015
*mangle
REROUTING ACCEPT [9412357:2044645224]
:INPUT ACCEPT [9412357:2044645224]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [12804124:16958926668]
OSTROUTING ACCEPT [12804124:16958926668]
COMMIT
# Completed on Mon Nov 16 11:03:08 2015
# Generated by iptables-save v1.4.21 on Mon Nov 16 11:03:08 2015
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:fail2ban-apache - [0:0]
:fail2ban-apache-multiport - [0:0]
:fail2ban-apache-noscript - [0:0]
:fail2ban-apache-overflows - [0:0]
:fail2ban-postfix - [0:0]
:fail2ban-ssh - [0:0]
:fail2ban-ssh-ddos - [0:0]
:ufw-after-forward - [0:0]
:ufw-after-input - [0:0]
:ufw-after-logging-forward - [0:0]
:ufw-after-logging-input - [0:0]
:ufw-after-logging-output - [0:0]
:ufw-after-output - [0:0]
:ufw-before-forward - [0:0]
:ufw-before-input - [0:0]
:ufw-before-logging-forward - [0:0]
:ufw-before-logging-input - [0:0]
:ufw-before-logging-output - [0:0]
:ufw-before-output - [0:0]
:ufw-reject-forward - [0:0]
:ufw-reject-input - [0:0]
:ufw-reject-output - [0:0]
:ufw-track-forward - [0:0]
:ufw-track-input - [0:0]
:ufw-track-output - [0:0]
-A INPUT -s 127.0.0.1/32 -p tcp -m tcp --dport 2008 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 2008 -j DROP
-A INPUT -p tcp -m multiport --dports 25,465,587 -j fail2ban-postfix
-A INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-overflows
-A INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-noscript
-A INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-multiport
-A INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache
-A INPUT -p tcp -m multiport --dports 22 -j fail2ban-ssh-ddos
-A INPUT -p tcp -m multiport --dports 22 -j fail2ban-ssh
-A INPUT -j ufw-before-logging-input
-A INPUT -j ufw-before-input
-A INPUT -j ufw-after-input
-A INPUT -j ufw-after-logging-input
-A INPUT -j ufw-reject-input
-A INPUT -j ufw-track-input
-A FORWARD -j ufw-before-logging-forward
-A FORWARD -j ufw-before-forward
-A FORWARD -j ufw-after-forward
-A FORWARD -j ufw-after-logging-forward
-A FORWARD -j ufw-reject-forward
-A FORWARD -j ufw-track-forward
-A OUTPUT -j ufw-before-logging-output
-A OUTPUT -j ufw-before-output
-A OUTPUT -j ufw-after-output
-A OUTPUT -j ufw-after-logging-output
-A OUTPUT -j ufw-reject-output
-A OUTPUT -j ufw-track-output
-A fail2ban-apache -j RETURN
-A fail2ban-apache-multiport -j RETURN
-A fail2ban-apache-noscript -j RETURN
-A fail2ban-apache-overflows -j RETURN
-A fail2ban-postfix -j RETURN
-A fail2ban-ssh -j RETURN
-A fail2ban-ssh-ddos -j RETURN
COMMIT
# Completed on Mon Nov 16 11:03:08 2015
AntiCrack activated.
Done. Press any key to continue...
# TS3 Server crack script 0516 by Supervisor #
# Join our community at r4p3.net #
#######################################################
Checking for updates... ...script is up to date!
#######################################################
# 1) Install Crack #
# 2) Update from 3.0.11.X to 3.0.11.4 #
# 3) Anticrash scripts #
# 4) Autostart scripts #
# 5) AntiCrack #
# 6) Status #
# 7) Debug #
# 8) Show special credits #
# 9) Show changelog + infos #
# CTRL-C to escape the script #
#######################################################
Answer: 5
#######################################################
# Note: Your server will appear as #
# "not cracked" to CrackCheckers if activated. #
# 1) Activate AntiCrack #
# 2) Deactivate AntiCrack #
#######################################################
Answer: 1
# Generated by iptables-save v1.4.21 on Mon Nov 16 11:03:08 2015
*mangle
REROUTING ACCEPT [9412357:2044645224]
:INPUT ACCEPT [9412357:2044645224]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [12804124:16958926668]
OSTROUTING ACCEPT [12804124:16958926668]
COMMIT
# Completed on Mon Nov 16 11:03:08 2015
# Generated by iptables-save v1.4.21 on Mon Nov 16 11:03:08 2015
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:fail2ban-apache - [0:0]
:fail2ban-apache-multiport - [0:0]
:fail2ban-apache-noscript - [0:0]
:fail2ban-apache-overflows - [0:0]
:fail2ban-postfix - [0:0]
:fail2ban-ssh - [0:0]
:fail2ban-ssh-ddos - [0:0]
:ufw-after-forward - [0:0]
:ufw-after-input - [0:0]
:ufw-after-logging-forward - [0:0]
:ufw-after-logging-input - [0:0]
:ufw-after-logging-output - [0:0]
:ufw-after-output - [0:0]
:ufw-before-forward - [0:0]
:ufw-before-input - [0:0]
:ufw-before-logging-forward - [0:0]
:ufw-before-logging-input - [0:0]
:ufw-before-logging-output - [0:0]
:ufw-before-output - [0:0]
:ufw-reject-forward - [0:0]
:ufw-reject-input - [0:0]
:ufw-reject-output - [0:0]
:ufw-track-forward - [0:0]
:ufw-track-input - [0:0]
:ufw-track-output - [0:0]
-A INPUT -s 127.0.0.1/32 -p tcp -m tcp --dport 2008 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 2008 -j DROP
-A INPUT -p tcp -m multiport --dports 25,465,587 -j fail2ban-postfix
-A INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-overflows
-A INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-noscript
-A INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache-multiport
-A INPUT -p tcp -m multiport --dports 80,443 -j fail2ban-apache
-A INPUT -p tcp -m multiport --dports 22 -j fail2ban-ssh-ddos
-A INPUT -p tcp -m multiport --dports 22 -j fail2ban-ssh
-A INPUT -j ufw-before-logging-input
-A INPUT -j ufw-before-input
-A INPUT -j ufw-after-input
-A INPUT -j ufw-after-logging-input
-A INPUT -j ufw-reject-input
-A INPUT -j ufw-track-input
-A FORWARD -j ufw-before-logging-forward
-A FORWARD -j ufw-before-forward
-A FORWARD -j ufw-after-forward
-A FORWARD -j ufw-after-logging-forward
-A FORWARD -j ufw-reject-forward
-A FORWARD -j ufw-track-forward
-A OUTPUT -j ufw-before-logging-output
-A OUTPUT -j ufw-before-output
-A OUTPUT -j ufw-after-output
-A OUTPUT -j ufw-after-logging-output
-A OUTPUT -j ufw-reject-output
-A OUTPUT -j ufw-track-output
-A fail2ban-apache -j RETURN
-A fail2ban-apache-multiport -j RETURN
-A fail2ban-apache-noscript -j RETURN
-A fail2ban-apache-overflows -j RETURN
-A fail2ban-postfix -j RETURN
-A fail2ban-ssh -j RETURN
-A fail2ban-ssh-ddos -j RETURN
COMMIT
# Completed on Mon Nov 16 11:03:08 2015
AntiCrack activated.
Done. Press any key to continue...