Download Check Point FireWall-1 v4.1 by DAMN

Added to site2002-12-31
Rating93/100
Votes9


checkpointfirewall1v4.1damn.zip (38943 bytes)

namesizecompressed
damn_cpf41.exe 43520 34559
damn.nfo 14654 3750
file_id.diz 499 240

damn.nfo

      ▄                                                               ▄▄▄      
   ▄▀▀                                                               ▀   ▀▀▄   
  ▐▌                                                                       ▐█  
_  ▀█▄▄▄▄      ___    __________ _    ▄    __________ _  ▄  ______ _    ▄▄█▀ _ 
     ▀▀▀▀█████▄▄▄▄ ░           ▄▄▄▄▄█▄ ██▄▄▄          ▄▄█▌  ▄        ▄███▓░    
  ▄▄████▄▄▄ ▀▀█████▓▄  ▄▄▄███▀▀▀▀██████▐██████▄   ▄██████▄██████▄  ░▓████▌     
   ▐██████      ▀████▄█████▄     ▐█████▀████████▄███████▓▐████████▄ ▐████▓░    
   ▐██████       ▐███▌█████▓░ ▄▄▄██████▌██████ ▀█▀ ██████▌██████ ▀██▄▐████▌    
   ▐██████      ▄████░▓██████▀▀▀▀██████▌▓█████     ██████▌▓█████   ▀██████▓░   
▄▄▄▐█████▓ ▄▄ ▄▓████▌▐██████ ▄▄▄ █████▓▐█████▓ ▄▄▄ ▒█████▐██████ ▄▄▄▐██████▌▄▄▄
    ██████▌▓▓▐█████▓░▐██████ ▓▓▓░▓█████▐██████▌▓▓▓ ▐████▓▐█████▒ ▓▓▓ █████▓░   
    ██████▌▒ ▓██████▌░▓████▓░▒▒▒ ▐████▌░▓█████▌▒▒▒ ▐████▌ ██████▌ ▒▒ █████▌    
   ░▓█████▌░ ▐██████▒ ░▓████▌░░░ ▐███▒  ░▓████▌░░░ ▐███▓░ ▒█████▌ ░░ ▓████▌    
   ▀▀▀█▀▀████▄███████▌ ░▀███▌ ░ ▄██▀▀    ░▀███▌░  ▄██▀▀░ ▀▀▀█▀▀▀▀▀░ ▐████▓░    
_ ________   ▀▀▀▀▓███▓░ _ ▀▀█▄ ▀ _sRT!CRo_  ▀▀█▄ ▀ ___________ _  ▄▄██▓▀▀░ _   
           ░     ░▀██▌        ▀                 ▀               ▄█▀   ░        
           ░       ▐█         ░                ░               ▐▌ ░            
           ░        ▀▄        ░                ░                ▀ ░            
                              ░                ░                               
           ░                                   ░                  ░            
                              ░    PRESENTS                                    
            ░                                  ░                 ░             
                                                                 ░             
             Check Point FireWall-1 v4.1 *Incl.Keymaker.and.Patch*

    ▄▄▄▄▄▄▄▄  ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄  ▄▄▄▄▄▄▄▄▄ 
   ╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┐ 
 ┌─┤▌  RELEASE INFO  ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   [ Program ............................. Check Point FireWall-1 v4.1 ]   █
 █   [ Type ........... One of the best and powerful firewalls abailable ]   █
 █   [ OS ........................................................ WinNT ]   █
 █   [ Protection ...... Screwed up Schnorr signature scheme (142 bit Q) ]   █
 █   [ By ...................... Check Point Software Technologies, Inc. ]   █
 █   [ Homepage .............................. http://www.checkpoint.com ]   █
 █                                                                           █
 █             [ Cracked by ........................ Ivanopulo ]             █
 █             [ Release type ........ Incl.Keymaker.and.Patch ]             █
 █             [ Release date ................... Apr 16, 2000 ]             █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌  DESCRIPTION   ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   FireWall-1  is  the  most  comprehensive  suite  of security products   █
 █   you'll find on the market                                               █
 █   today.                                                                  █
 █                                                                           █
 █   Internet  technology  has  changed  not only the way organizations do   █
 █   business,  but  also  the  way  they  approach  network security. The   █
 █   dynamic  nature  of  todays corporate networks means that they are no   █
 █   longer defined by physical boundaries, but instead by enterprise-wide   █
 █   security  policies.  To  be  effective, these policies must include a   █
 █   broad  range  of  security  services  that  govern  access to network   █
 █   resources,  while  protecting these same resources from both internal   █
 █   and external threats.                                                   █
 █                                                                           █
 █   A complete enterprise security solution must provide the ability to:    █
 █                                                                           █
 █   -  Grant  selective network access to authorized remote and corporate   █
 █   users                                                                   █
 █   -  Authenticate  network  users with strong authentication techniques   █
 █   before granting access to sensitive corporate data                      █
 █   -  Ensure the privacy and integrity of communications over untrusted,   █
 █   public networks like the Internet                                       █
 █   -  Provide  content  security  at  the  gateway  to  screen malicious   █
 █   content, such as viruses and malevolent Java/ActiveX applets            █
 █   -  Detect  network  attacks  and  misuse  in  real  time  and respond   █
 █   automatically to defeat an attack                                       █
 █   -  Protect  internal  network  addressing  schemes  and  conserve  IP   █
 █   addresses                                                               █
 █   - Ensure high availability to network resources and applications        █
 █   -   Deliver  detailed  logging  and  accounting  information  on  all   █
 █   communication attempts                                                  █
 █                                                                           █
 █   With  its  Enterprise Security Management product family, Check Point   █
 █   Software  Technologies  offers  a comprehensive set of solutions that   █
 █   meet  these  demanding  requirements.  Check  Points FireWall-1/VPN-1   █
 █   security  suites  enable all functionality to be deployed and managed   █
 █   with  a  single  enterprise-wide  security policy for straightforward   █
 █   management and administration.                                          █
 █                                                                           █
 █   Enterprise  security  solutions  are  unified  by Check Point's OPSEC   █
 █   [Open  Platform  for  Security]  policy  management  framework  which   █
 █   provides  central integration, configuration and management for Check   █
 █   Point  products  as  well as other third-party security applications.   █
 █   Only  Check Point provides organizations with the ability to define a   █
 █   single,  integrated  security  policy  that can be distributed across   █
 █   multiple    gateways  and  managed  remotely  from  anywhere  on  the   █
 █   enterprise    network.  There  is  never  any  need  to  individually   █
 █   reconfigure each security gateway.                                      █
 █                                                                           █
 █   All  of  Check  Points  security  solutions  are  built  on  Stateful   █
 █   Inspection,  the  de  facto  standard  for  network security that was   █
 █   invented  and  patented  by Check Point. Stateful Inspection provides   █
 █   full  application-layer  awareness without requiring a separate proxy   █
 █   for  every  Internet service and protocol. This provides unparalleled   █
 █   performance,  scalability,  and the ability to support new and custom   █
 █   applications and services quickly and easily.                           █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌  INSTRUCTIONS  ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Okay... first of all some information for you.                          █
 █                                                                           █
 █   The  program's  protection mechanism has been changed in this version   █
 █   to  1024/142  Schnorr signature scheme. Authors even went further and   █
 █   changed the algorithm... maybe with the intent of making it harder to   █
 █   break.  In  fact  they  just  dramatically DECREASED security of this   █
 █   strong  public key signature scheme with their poor attempt (from DLP   █
 █   in  the  subgroup  of prime order (142bit) to brute forcing just 2^64   █
 █   variants,  which  is  _theoretically_ possible). But, anyway... valid   █
 █   signature depends on the host's IP and my goal was to write a product   █
 █   that  generates  licenses  for FireWall-1 on any machine. I'm glad to   █
 █   tell  you  I've succeeded but this required making some minor changes   █
 █   to scheme's parameters.                                                 █
 █                                                                           █
 █   So...  how do you persuade Check Point FireWall-1 v4.1 to accept your   █
 █   license?                                                                █
 █                                                                           █
 █   *Patching* (to be performed once)                                       █
 █                                                                           █
 █   1. STOP Check Point FireWall-1 Service                                  █
 █   2. Start the keymaker/patch                                             █
 █   3.  It detects the program's directory location automatically, so all   █
 █   you need to do is to press 'Patch It' button.                           █
 █   4.  Looks  at  the  messages in the patching progress log window, and   █
 █   when/if  it tells you it finished successfully - you're ready for the   █
 █   second stage (license generation)                                       █
 █                                                                           █
 █   *License generation*                                                    █
 █                                                                           █
 █   Enter  your  host and desired program's features. (In case you're not   █
 █   satisfied  with  the  default  set provided by the keymaker - look in   █
 █   cp.macro  file  in  the  'conf'  directory for more feature options).   █
 █   Press 'Generate it' and voila... You've got the key :)                  █
 █                                                                           █
 █   Please  let  me  know  if you encounter any problem with getting this   █
 █   thing to work (NO, this doesn't mean emailing me with things like 'it   █
 █   doesn't  work,  period'.  Please  be  as  detailed  as  you  can when   █
 █   reporting a problem.                                                    █
 █                                                                           █
 █   Enjoy =)                                                                █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌    CREDITS     ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   I'd  like  to say a big thank you to my good friend Dimedrol/CORE. He   █
 █   wrote  keymakers  for previous versions of this program and helped me   █
 █   with understanding some things related to this one. I think it's okay   █
 █   to  say  that  we cracked this one together. BTW, he asked me to send   █
 █   his  'Hi' to Check Point guys. So if you work in Check Point Software   █
 █   Technologies Ltd. - my mission with that is complete =P                 █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌   GREETINGS    ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Our  greetings  fly  to all groups and crackers who work hard to keep   █
 █   the Scene alive.                                                        █
 █                                                                           █
 █   Personal greetings to: Dimedrol, russ97, egis.                          █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌    CONTACT     ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Visit our www site at       [ http://www.damn.to ]                      █
 █   Backup page                 [ http://damn.da.ru  ]                      █
 █                                                                           █
 █   Email address for contacts  [ [email protected]  ]                      █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  └─ ────── ─ ──══── ─ ────── ┬ ────── ─ ────── ┬ ────── ─ ──══── ─ ────── ─┘  
                              │▌ (c) 2000 DAMN ▐│                              
                              └ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┘                              



file_id.diz

Check Point FireWall-1 v4.1 *Incl.Keymaker.and.Patch*

DATE: [04/16/2000] OS: [WinNT] DISK: [01/05]
  ________________________________________
__\ _____   ___________  ______ _________ 
____\    \__\    \     \/     /_\       / 
\    \    \   |\  \          /   \     /  
/    |\    \       \  \  /  /\    \   /   
\__________/__/\____\__\/__/s8\____\_/    
_ ____________ _ __________ _ ______ _    
-= [ DAMN 2000 http://www.damn.to ] =-    
- ------------ - ---------- - ------ -    



# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z