www.Zemra.Org

BOPM

How To Install BOPM
Si Instalohet BOPM

Blitzed Open Proxy Monitor (BOPM) is a proxy monitor that scans all incoming connections to a server (or network depending on configuration). When a client connects BOPM scans the client for open proxies, it then determines whether they are really open by using them to connect back to the server.
1. wget http://static.blitzed.org/www.blitzed.org/bopm/files/bopm-3.1.3.tar.gz
2. tar -xvf bopm-3.1.3.tar.gz
3. rm -rf bopm-3.1.3.tar.gz
4. cd bopm-3.1.3
5. ./configure --prefix=/home/user/bopm
6. make
7. make install
8. cd
9. cd bopm/etc
10. pico bopm.conf

/* This is a modified bopm.conf
* https://www.zemra.org
* LAST MODIFIED: 2010-11-20
*/

options {
/* Full path and filename for file storing the process ID */
pidfile = “/home/EviL/bopm/bopm.pid”;

/* seconds to store the IP address of hosts */
#    negcache = 3600;

/* Amount of file descriptors to allocate to asynchronous DNS */
dns_fdlimit = 64;

/* full path and filename of scan logfile */
#    scanlog = “/home/EviL/bopm/scan.log”;
};

IRC {
/* IP to bind to for the IRC connection */
vhost = “72.20.42.110”;

/* Nickname for BOPM to use */
nick = “TheHawk”;

/* Text to appear in the “realname” field of BOPM’s whois output */
realname = “Open Proxy Monitoring”;

/* If you don’t have an identd running, what username to use */
username = “nix”;

/* Hostname (or IP) of the IRC server */
server = “72.20.42.110”;

/* Password used to connect to the IRC server (PASS) */
#    password = “secret”;

/* Connect to IRC server via this port */
port = 6667;

/* Command to identify to NickServ */
#    nickserv = “privmsg nickserv :identify <password>”;

/* The username and password needed for BOPM to oper up */
oper = “BOPM bopmoperpass”;

/* with the following modes this BOPM will see ALL network Connections
* See Unreal documentation for more information on user modes
*/
mode = “+s +cF”;

/* Specify BOPM control channel(s) */
channel {
/* Channel name. */
name = “#Staff”;

/* Channel key */
key = “<channel-key>”;

/* command used to ask chanserv for invite */
#        invite = “privmsg chanserv :invite #bopm”;
};

/* connregex is a POSIX regular expression used to parse connection
* (+c) notices from the ircd. The complexity of the expression should
* be kept to a minimum so load is @ a minimum even during ‘heavy’ traffic */

/* Unreal in HCN mode */
#    connregex = “\*\*\* Notice — Client connecting: ([^ ]+) \(([^@]+)@([^\)]+)\) \[([0-9\.]+)\].*”;
connregex = “\*\*\* Notice — Client connecting[.A-Za-z0-9 ]*: ([^ ]+) \(([^@]+)@([^\)]+)\) \[([0-9\.]+)\].*”;

/* default kline
*  %n User’s nick
*  %u User’s username     – REMEMBER!
*  %h User’s irc hostname – bots (& blacklists) don’t necessarily have (contain) hostnames
*  %i User’s IP address   – but they ALWAYS have IPs */
kline = “gline +*@%i 7d :Open Proxy found on your host.”;

/* Text to send on connection. Specify multiple with multiple lines. */
perform = “PROTOCTL HCN”;
};

OPM {

blacklist {
name = “rbl.efnetrbl.org”;
type = “A record reply”;
reply {
1 = “Open proxy”;
2 = “spamtrap666”;
3 = “spamtrap50”;
4 = “TOR exit server”;
5 = “Drones / Flooding”;
};
ban_unknown = no;
kline = “gline +*@%i 0 :4An open proxy was detected in your host1 – EFnetRBL”;
};

blacklist {
name = “dnsbl.dronebl.org”;
type = “A record reply”;
reply {
3 = “IRC Drone”;
4 = “Tor”;
5 = “Bottler”;
6 = “Unknown spambot or drone”;
7 = “DDOS Drone”;
8 = “SOCKS Proxy”;
9 = “HTTP Proxy”;
10 = “ProxyChain”;
};
ban_unknown = no;
kline = “gline +*@%i 0 :4An open proxy was detected in your host1 – DroneBL”;
};

blacklist {
name = “dnsbl.njabl.org”;
type = “A record reply”;
reply {
2 = “Open Relay”;
4 = “Confirmed Spam Source”;
9 = “Open Proxy”;
};
ban_unknown = no;
kline = “gline +*@%i 0 :4An open proxy was detected in your host1 – NJABL”;
};

blacklist {
name = “dnsbl.swiftbl.org”;
type = “A record reply”;
reply {
2 = “SOCKS Proxy”;
3 = “IRC Proxy”;
4 = “HTTP Proxy”;
5 = “IRC Drone”;
6 = “TOR”;
};
ban_unknown = no;
kline = “gline +*@%i 0 :4An open proxy was detected in your host1 – SwiftBL”;
};

blacklist {
name = “dnsbl.proxybl.org”;
type = “A record reply”;
reply {
2 = “Open proxy”;
};
ban_unknown = no;
kline = “gline +*@%i 0 :4An open proxy was detected in your host1 – ProxyBL”;
};

/* the next two entries might match too many IPs
* so they’re commented out for now
*/

/*
blacklist {
name = “dnsbl-2.uceprotect.net”;
type = “A record reply”;
reply {
2 = “Matched Entry”;
};
ban_unknown = no;
kline = “gline +*@%i 7d :uceprotect”;
};

blacklist {
name = “xbl.spamhaus.org”;
type = “A record reply”;
reply {
4 = “CBL Detected Address”
};
ban_unknown = no;
kline = “gline +*@%i 7d :4An open proxy was detected in your host1 – SpamhausXBL”;
};
*/
/* Pretend to send reports FROM */
#    dnsbl_from = “mybopm@myserver.example.com”;

/* Email address to send reports TO.  Specify multiple with multiple lines. */
#    dnsbl_to = “bopm-report@dronebl.org”;

/* Full path to your sendmail binary */
#    sendmail = “/usr/sbin/sendmail”;
};

/* Exempt hosts matching (hostname or IP) strings from any form of scanning or dnsbl */
exempt {
mask = “*!*@127.0.0.1”;
};

exempt {
mask = “*!*@72.20.42.*”; # Zemra.Org SHELL IP
};

12. cd ..
13. cd bin
14. ./bopm

Written by DeviL
www.Zemra.Org
Email: Info@Zemra.Org

Exit mobile version