Download ISS Internet Security Scanner v6.1 by DAMN

Added to site2002-12-31
Rating80/100
Votes3


issinternetsecurityscannerv6.1damn.zip (57795 bytes)

namesizecompressed
damn_iss61f.exe 66116 53634
damn.nfo 13843 3499
file_id.diz 504 242

damn.nfo

      ▄                                                               ▄▄▄      
   ▄▀▀                                                               ▀   ▀▀▄   
  ▐▌                                                                       ▐█  
_  ▀█▄▄▄▄      ___    __________ _    ▄    __________ _  ▄  ______ _    ▄▄█▀ _ 
     ▀▀▀▀█████▄▄▄▄ ░           ▄▄▄▄▄█▄ ██▄▄▄          ▄▄█▌  ▄        ▄███▓░    
  ▄▄████▄▄▄ ▀▀█████▓▄  ▄▄▄███▀▀▀▀██████▐██████▄   ▄██████▄██████▄  ░▓████▌     
   ▐██████      ▀████▄█████▄     ▐█████▀████████▄███████▓▐████████▄ ▐████▓░    
   ▐██████       ▐███▌█████▓░ ▄▄▄██████▌██████ ▀█▀ ██████▌██████ ▀██▄▐████▌    
   ▐██████      ▄████░▓██████▀▀▀▀██████▌▓█████     ██████▌▓█████   ▀██████▓░   
▄▄▄▐█████▓ ▄▄ ▄▓████▌▐██████ ▄▄▄ █████▓▐█████▓ ▄▄▄ ▒█████▐██████ ▄▄▄▐██████▌▄▄▄
    ██████▌▓▓▐█████▓░▐██████ ▓▓▓░▓█████▐██████▌▓▓▓ ▐████▓▐█████▒ ▓▓▓ █████▓░   
    ██████▌▒ ▓██████▌░▓████▓░▒▒▒ ▐████▌░▓█████▌▒▒▒ ▐████▌ ██████▌ ▒▒ █████▌    
   ░▓█████▌░ ▐██████▒ ░▓████▌░░░ ▐███▒  ░▓████▌░░░ ▐███▓░ ▒█████▌ ░░ ▓████▌    
   ▀▀▀█▀▀████▄███████▌ ░▀███▌ ░ ▄██▀▀    ░▀███▌░  ▄██▀▀░ ▀▀▀█▀▀▀▀▀░ ▐████▓░    
_ ________   ▀▀▀▀▓███▓░ _ ▀▀█▄ ▀ _sRT!CRo_  ▀▀█▄ ▀ ___________ _  ▄▄██▓▀▀░ _   
           ░     ░▀██▌        ▀                 ▀               ▄█▀   ░        
           ░       ▐█         ░                ░               ▐▌ ░            
           ░        ▀▄        ░                ░                ▀ ░            
                              ░                ░                               
           ░                                   ░                  ░            
                              ░    PRESENTS                                    
            ░                                  ░                 ░             
                                                                 ░             
            ISS Internet Security Scanner v6.1 *FIXED.Keymaker.Only*

    ▄▄▄▄▄▄▄▄  ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄  ▄▄▄▄▄▄▄▄▄ 
   ╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┐ 
 ┌─┤▌  RELEASE INFO  ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   [ Program ...................... ISS Internet Security Scanner v6.1 ]   █
 █   [ Type ................................... Network security scanner ]   █
 █   [ OS ...................................................... WinNT2k ]   █
 █   [ Protection ........................................ DSA, Blowfish ]   █
 █   [ By ............................... Internet Security Systems Inc. ]   █
 █   [ Homepage ..................................... http://www.iss.net ]   █
 █                                                                           █
 █         [ Cracked by ................................ Ivanopulo ]         █
 █         [ Release type .................... FIXED.Keymaker.Only ]         █
 █         [ Release date ........................... Oct 27, 2000 ]         █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌    FIX INFO    ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   I'm sorry, but the keys generated by previous version of the keymaker   █
 █   sometimes made the program to crash on start. It's fixed in this one.   █
 █   I've also added the possibility for the user to specify IP range.       █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌  DESCRIPTION   ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Internet  Scanner provides automated security vulnerability detection   █
 █   and  analysis  for  devices  on a network. This policy-driven process   █
 █   measures    and   manages   information   security   risk,   allowing   █
 █   Administrators to match security policy with rapidly changing demands   █
 █   for  open  networking  applications  and increasingly complex network   █
 █   environments.                                                           █
 █                                                                           █
 █   Internet  Scanner  is the computing and security industry's preferred   █
 █   solution  for  network  vulnerability  assessment and audit analysis.   █
 █   Internet  Scanner directly addresses the single most important aspect   █
 █   of    organizational   network  risk  management  -  IDENTIFYING  AND   █
 █   ADDRESSING   TECHNICAL  VULNERABILITIES.  Internet  Scanner  provides   █
 █   detailed  technical  policies  and  performs  scheduled and selective   █
 █   vulnerability  probes and assessments of your network's communication   █
 █   services,  operating systems, key applications, and routers. Internet   █
 █   Scanner  searches  for  those  vulnerabilities  used  by unscrupulous   █
 █   attackers  to  probe,  investigate,  and  attack  your  network. It's   █
 █   ActiveAlert  feature  provides  real  time  notification  of critical   █
 █   issues.  Its  powerful  reporting  and  analysis engines analyze your   █
 █   vulnerability  conditions  and provide a series of corrective action,   █
 █   trends analysis, audit variance, and configuration reports.             █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌  INSTRUCTIONS  ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Run  the  keymaker  and  generate  your  keyfile  (save it to Scanner   █
 █   folder).  It  will  give  you  nonexpiring  license with all features   █
 █   turned on.                                                              █
 █                                                                           █
 █   Enjoy =)                                                                █
 █                                                                           █
 █   As  for  the  issue with RBS' stolen release, I really didn't want to   █
 █   accuse  the  whole  group in my previous nfo, and the only reason for   █
 █   doing this instead of addressing the person who did steal the key was   █
 █   that  I  failed to find out his name (and ppl in RBS' channel weren't   █
 █   of any help). Hope things will get sorted out soon.                     █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌   PROTECTION   ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Tough.  Very  tough.  But  it's  the  case  when  I  had to deal with   █
 █   'security by obscurity' one more time.                                  █
 █                                                                           █
 █   Here is the key checking procedure:                                     █
 █                                                                           █
 █   Keyfile  is  in  base64.  After it's converted to base256, it (except   █
 █   last  10  bytes)  gets  decrypted  with Blowfish using XOR of last 10   █
 █   bytes  with  MD5  value  of  some hardcoded copyright string. Last 10   █
 █   bytes of the key must be equal to MD5 value of decryption result. The   █
 █   decryption  result contains another Blowfish key, along with one more   █
 █   MD5  digest  and  DSA  signature and public key. Also it contains one   █
 █   more encrypted buffer. This buffer gets decrypted with BF key 2, then   █
 █   the  hash  is  taken  and compared to the above MD5 value. If they're   █
 █   equal,  then  DSA signature for this hash is verifyed. If it's valid,   █
 █   routine  continues.  Last  decrypted buffer contains key chunks, each   █
 █   (quite)  of  them  contains  small  header  with chunk type, customer   █
 █   number  etc.  along  with  chunk  data  and (again) DSA signature and   █
 █   public  key.  If  signatures  are ok in all chunks (this time they're   █
 █   verified using SHA-1), the key is nearly acctepted, but the following   █
 █   checks has little to do with cryptography.                              █
 █                                                                           █
 █   DSA is used with 512bit large prime. Only P, G and Q are hardcoded in   █
 █   the executables. Public key is in the keyfile. Very stupid.             █
 █                                                                           █
 █   Pretty  complex,  eh?  But it's all vain. I'd suggest ISS to fire the   █
 █   guy  who  implemented  the  protection  because  he's obviously not a   █
 █   specialist  in  this  field. Heh, it's kind of ironic... program that   █
 █   scans for others' security flaws has a big hole inside...               █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌  VERIFICATION  ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Due  to  the  every  day  increasing  amount  of lamers who fake DAMN   █
 █   releases  ALL  DAMN releases starting from July 1, 2000 are digitally   █
 █   signed.                                                                 █
 █                                                                           █
 █   Download  DAMN  Release Signature Verificator from http://www.damn.to   █
 █   (about  100K  only)  if  you want to be sure that release you got was   █
 █   really made by DAMN.                                                    █
 █                                                                           █
 █   Don't  use  any  stuff  claiming  to be made by DAMN if it's released   █
 █   after  July  1,  2000  and doesn't pass verification. Using it can be   █
 █   dangerous.                                                              █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌   GREETINGS    ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Our  greetings  fly  to all groups and crackers who work hard to keep   █
 █   the Scene alive.                                                        █
 █                                                                           █
 █   Personal  greetings  to:  egis,  Dimedrol,  Duelist, Quantico, Recca,   █
 █   russ97, tHE EGOiSTE.                                                    █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  │╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤ 
 ┌┴┤▌    CONTACT     ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
 █ ╘══════════════════╛                                                      █
 █                                                                           █
 █   Visit our www site at       [ http://www.damn.to ]                      █
 █   Backup page                 [ http://damn.da.ru  ]                      █
 █                                                                           █
 █   Email address for contacts  [ [email protected]  ]                      █
 █                                                                           █
 └┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
  └─ ────── ─ ──══── ─ ────── ┬ ────── ─ ────── ┬ ────── ─ ──══── ─ ────── ─┘  
                              │▌ (c) 2000 DAMN ▐│                              
                              └ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┘                              

 ----------------------- DAMN RELEASE SIGNATURE START ------------------------
 damn_iss61f.exe 1 g6ypFebk5LTuFUfmEQ2WPH6jaSg qt/LKRiOmt1DZBw1uiDTA1sCEoc
 damn.nfo 0 MQpy2r7740K2cUprJSNC2yOA9d8 Ws2GfGJiUD6dxb8348/EfQVo4as
 ------------------------ DAMN RELEASE SIGNATURE END -------------------------



file_id.diz

ISS Internet Security Scanner v6.1 *FIXED.Keymaker.Only*

DATE: [10/27/2000] OS: [WinNT2k] DISK: [01/01]
  ________________________________________
__\ _____   ___________  ______ _________ 
____\    \__\    \     \/     /_\       / 
\    \    \   |\  \          /   \     /  
/    |\    \       \  \  /  /\    \   /   
\__________/__/\____\__\/__/s8\____\_/    
_ ____________ _ __________ _ ______ _    
-= [ DAMN 2000 http://www.damn.to ] =-    
- ------------ - ---------- - ------ -    



# 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z