▄ ▄▄▄
▄▀▀ ▀ ▀▀▄
▐▌ ▐█
_ ▀█▄▄▄▄ ___ __________ _ ▄ __________ _ ▄ ______ _ ▄▄█▀ _
▀▀▀▀█████▄▄▄▄ ░ ▄▄▄▄▄█▄ ██▄▄▄ ▄▄█▌ ▄ ▄███▓░
▄▄████▄▄▄ ▀▀█████▓▄ ▄▄▄███▀▀▀▀██████▐██████▄ ▄██████▄██████▄ ░▓████▌
▐██████ ▀████▄█████▄ ▐█████▀████████▄███████▓▐████████▄ ▐████▓░
▐██████ ▐███▌█████▓░ ▄▄▄██████▌██████ ▀█▀ ██████▌██████ ▀██▄▐████▌
▐██████ ▄████░▓██████▀▀▀▀██████▌▓█████ ██████▌▓█████ ▀██████▓░
▄▄▄▐█████▓ ▄▄ ▄▓████▌▐██████ ▄▄▄ █████▓▐█████▓ ▄▄▄ ▒█████▐██████ ▄▄▄▐██████▌▄▄▄
██████▌▓▓▐█████▓░▐██████ ▓▓▓░▓█████▐██████▌▓▓▓ ▐████▓▐█████▒ ▓▓▓ █████▓░
██████▌▒ ▓██████▌░▓████▓░▒▒▒ ▐████▌░▓█████▌▒▒▒ ▐████▌ ██████▌ ▒▒ █████▌
░▓█████▌░ ▐██████▒ ░▓████▌░░░ ▐███▒ ░▓████▌░░░ ▐███▓░ ▒█████▌ ░░ ▓████▌
▀▀▀█▀▀████▄███████▌ ░▀███▌ ░ ▄██▀▀ ░▀███▌░ ▄██▀▀░ ▀▀▀█▀▀▀▀▀░ ▐████▓░
_ ________ ▀▀▀▀▓███▓░ _ ▀▀█▄ ▀ _sRT!CRo_ ▀▀█▄ ▀ ___________ _ ▄▄██▓▀▀░ _
░ ░▀██▌ ▀ ▀ ▄█▀ ░
░ ▐█ ░ ░ ▐▌ ░
░ ▀▄ ░ ░ ▀ ░
░ ░
░ ░ ░
░ PRESENTS
░ ░ ░
░
Check Point FireWall-1 v4.1 *Incl.Keymaker.and.Patch*
▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄
╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┐
┌─┤▌ RELEASE INFO ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ [ Program ............................. Check Point FireWall-1 v4.1 ] █
█ [ Type ........... One of the best and powerful firewalls abailable ] █
█ [ OS ........................................................ WinNT ] █
█ [ Protection ...... Screwed up Schnorr signature scheme (142 bit Q) ] █
█ [ By ...................... Check Point Software Technologies, Inc. ] █
█ [ Homepage .............................. http://www.checkpoint.com ] █
█ █
█ [ Cracked by ........................ Ivanopulo ] █
█ [ Release type ........ Incl.Keymaker.and.Patch ] █
█ [ Release date ................... Apr 16, 2000 ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ DESCRIPTION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ FireWall-1 is the most comprehensive suite of security products █
█ you'll find on the market █
█ today. █
█ █
█ Internet technology has changed not only the way organizations do █
█ business, but also the way they approach network security. The █
█ dynamic nature of todays corporate networks means that they are no █
█ longer defined by physical boundaries, but instead by enterprise-wide █
█ security policies. To be effective, these policies must include a █
█ broad range of security services that govern access to network █
█ resources, while protecting these same resources from both internal █
█ and external threats. █
█ █
█ A complete enterprise security solution must provide the ability to: █
█ █
█ - Grant selective network access to authorized remote and corporate █
█ users █
█ - Authenticate network users with strong authentication techniques █
█ before granting access to sensitive corporate data █
█ - Ensure the privacy and integrity of communications over untrusted, █
█ public networks like the Internet █
█ - Provide content security at the gateway to screen malicious █
█ content, such as viruses and malevolent Java/ActiveX applets █
█ - Detect network attacks and misuse in real time and respond █
█ automatically to defeat an attack █
█ - Protect internal network addressing schemes and conserve IP █
█ addresses █
█ - Ensure high availability to network resources and applications █
█ - Deliver detailed logging and accounting information on all █
█ communication attempts █
█ █
█ With its Enterprise Security Management product family, Check Point █
█ Software Technologies offers a comprehensive set of solutions that █
█ meet these demanding requirements. Check Points FireWall-1/VPN-1 █
█ security suites enable all functionality to be deployed and managed █
█ with a single enterprise-wide security policy for straightforward █
█ management and administration. █
█ █
█ Enterprise security solutions are unified by Check Point's OPSEC █
█ [Open Platform for Security] policy management framework which █
█ provides central integration, configuration and management for Check █
█ Point products as well as other third-party security applications. █
█ Only Check Point provides organizations with the ability to define a █
█ single, integrated security policy that can be distributed across █
█ multiple gateways and managed remotely from anywhere on the █
█ enterprise network. There is never any need to individually █
█ reconfigure each security gateway. █
█ █
█ All of Check Points security solutions are built on Stateful █
█ Inspection, the de facto standard for network security that was █
█ invented and patented by Check Point. Stateful Inspection provides █
█ full application-layer awareness without requiring a separate proxy █
█ for every Internet service and protocol. This provides unparalleled █
█ performance, scalability, and the ability to support new and custom █
█ applications and services quickly and easily. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ INSTRUCTIONS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Okay... first of all some information for you. █
█ █
█ The program's protection mechanism has been changed in this version █
█ to 1024/142 Schnorr signature scheme. Authors even went further and █
█ changed the algorithm... maybe with the intent of making it harder to █
█ break. In fact they just dramatically DECREASED security of this █
█ strong public key signature scheme with their poor attempt (from DLP █
█ in the subgroup of prime order (142bit) to brute forcing just 2^64 █
█ variants, which is _theoretically_ possible). But, anyway... valid █
█ signature depends on the host's IP and my goal was to write a product █
█ that generates licenses for FireWall-1 on any machine. I'm glad to █
█ tell you I've succeeded but this required making some minor changes █
█ to scheme's parameters. █
█ █
█ So... how do you persuade Check Point FireWall-1 v4.1 to accept your █
█ license? █
█ █
█ *Patching* (to be performed once) █
█ █
█ 1. STOP Check Point FireWall-1 Service █
█ 2. Start the keymaker/patch █
█ 3. It detects the program's directory location automatically, so all █
█ you need to do is to press 'Patch It' button. █
█ 4. Looks at the messages in the patching progress log window, and █
█ when/if it tells you it finished successfully - you're ready for the █
█ second stage (license generation) █
█ █
█ *License generation* █
█ █
█ Enter your host and desired program's features. (In case you're not █
█ satisfied with the default set provided by the keymaker - look in █
█ cp.macro file in the 'conf' directory for more feature options). █
█ Press 'Generate it' and voila... You've got the key :) █
█ █
█ Please let me know if you encounter any problem with getting this █
█ thing to work (NO, this doesn't mean emailing me with things like 'it █
█ doesn't work, period'. Please be as detailed as you can when █
█ reporting a problem. █
█ █
█ Enjoy =) █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ CREDITS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ I'd like to say a big thank you to my good friend Dimedrol/CORE. He █
█ wrote keymakers for previous versions of this program and helped me █
█ with understanding some things related to this one. I think it's okay █
█ to say that we cracked this one together. BTW, he asked me to send █
█ his 'Hi' to Check Point guys. So if you work in Check Point Software █
█ Technologies Ltd. - my mission with that is complete =P █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ GREETINGS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Our greetings fly to all groups and crackers who work hard to keep █
█ the Scene alive. █
█ █
█ Personal greetings to: Dimedrol, russ97, egis. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ CONTACT ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Visit our www site at [ http://www.damn.to ] █
█ Backup page [ http://damn.da.ru ] █
█ █
█ Email address for contacts [ [email protected] ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
└─ ────── ─ ──══── ─ ────── ┬ ────── ─ ────── ┬ ────── ─ ──══── ─ ────── ─┘
│▌ (c) 2000 DAMN ▐│
└ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┘