▄ ▄▄▄
▄▀▀ ▀ ▀▀▄
▐▌ ▐█
_ ▀█▄▄▄▄ ___ __________ _ ▄ __________ _ ▄ ______ _ ▄▄█▀ _
▀▀▀▀█████▄▄▄▄ ░ ▄▄▄▄▄█▄ ██▄▄▄ ▄▄█▌ ▄ ▄███▓░
▄▄████▄▄▄ ▀▀█████▓▄ ▄▄▄███▀▀▀▀██████▐██████▄ ▄██████▄██████▄ ░▓████▌
▐██████ ▀████▄█████▄ ▐█████▀████████▄███████▓▐████████▄ ▐████▓░
▐██████ ▐███▌█████▓░ ▄▄▄██████▌██████ ▀█▀ ██████▌██████ ▀██▄▐████▌
▐██████ ▄████░▓██████▀▀▀▀██████▌▓█████ ██████▌▓█████ ▀██████▓░
▄▄▄▐█████▓ ▄▄ ▄▓████▌▐██████ ▄▄▄ █████▓▐█████▓ ▄▄▄ ▒█████▐██████ ▄▄▄▐██████▌▄▄▄
██████▌▓▓▐█████▓░▐██████ ▓▓▓░▓█████▐██████▌▓▓▓ ▐████▓▐█████▒ ▓▓▓ █████▓░
██████▌▒ ▓██████▌░▓████▓░▒▒▒ ▐████▌░▓█████▌▒▒▒ ▐████▌ ██████▌ ▒▒ █████▌
░▓█████▌░ ▐██████▒ ░▓████▌░░░ ▐███▒ ░▓████▌░░░ ▐███▓░ ▒█████▌ ░░ ▓████▌
▀▀▀█▀▀████▄███████▌ ░▀███▌ ░ ▄██▀▀ ░▀███▌░ ▄██▀▀░ ▀▀▀█▀▀▀▀▀░ ▐████▓░
_ ________ ▀▀▀▀▓███▓░ _ ▀▀█▄ ▀ _sRT!CRo_ ▀▀█▄ ▀ ___________ _ ▄▄██▓▀▀░ _
░ ░▀██▌ ▀ ▀ ▄█▀ ░
░ ▐█ ░ ░ ▐▌ ░
░ ▀▄ ░ ░ ▀ ░
░ ░
░ ░ ░
░ PRESENTS
░ ░ ░
░
ISS Internet Security Scanner v6.1 *FIXED.Keymaker.Only*
▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▄▄
╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┐
┌─┤▌ RELEASE INFO ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ [ Program ...................... ISS Internet Security Scanner v6.1 ] █
█ [ Type ................................... Network security scanner ] █
█ [ OS ...................................................... WinNT2k ] █
█ [ Protection ........................................ DSA, Blowfish ] █
█ [ By ............................... Internet Security Systems Inc. ] █
█ [ Homepage ..................................... http://www.iss.net ] █
█ █
█ [ Cracked by ................................ Ivanopulo ] █
█ [ Release type .................... FIXED.Keymaker.Only ] █
█ [ Release date ........................... Oct 27, 2000 ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ FIX INFO ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ I'm sorry, but the keys generated by previous version of the keymaker █
█ sometimes made the program to crash on start. It's fixed in this one. █
█ I've also added the possibility for the user to specify IP range. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ DESCRIPTION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Internet Scanner provides automated security vulnerability detection █
█ and analysis for devices on a network. This policy-driven process █
█ measures and manages information security risk, allowing █
█ Administrators to match security policy with rapidly changing demands █
█ for open networking applications and increasingly complex network █
█ environments. █
█ █
█ Internet Scanner is the computing and security industry's preferred █
█ solution for network vulnerability assessment and audit analysis. █
█ Internet Scanner directly addresses the single most important aspect █
█ of organizational network risk management - IDENTIFYING AND █
█ ADDRESSING TECHNICAL VULNERABILITIES. Internet Scanner provides █
█ detailed technical policies and performs scheduled and selective █
█ vulnerability probes and assessments of your network's communication █
█ services, operating systems, key applications, and routers. Internet █
█ Scanner searches for those vulnerabilities used by unscrupulous █
█ attackers to probe, investigate, and attack your network. It's █
█ ActiveAlert feature provides real time notification of critical █
█ issues. Its powerful reporting and analysis engines analyze your █
█ vulnerability conditions and provide a series of corrective action, █
█ trends analysis, audit variance, and configuration reports. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ INSTRUCTIONS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Run the keymaker and generate your keyfile (save it to Scanner █
█ folder). It will give you nonexpiring license with all features █
█ turned on. █
█ █
█ Enjoy =) █
█ █
█ As for the issue with RBS' stolen release, I really didn't want to █
█ accuse the whole group in my previous nfo, and the only reason for █
█ doing this instead of addressing the person who did steal the key was █
█ that I failed to find out his name (and ppl in RBS' channel weren't █
█ of any help). Hope things will get sorted out soon. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ PROTECTION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Tough. Very tough. But it's the case when I had to deal with █
█ 'security by obscurity' one more time. █
█ █
█ Here is the key checking procedure: █
█ █
█ Keyfile is in base64. After it's converted to base256, it (except █
█ last 10 bytes) gets decrypted with Blowfish using XOR of last 10 █
█ bytes with MD5 value of some hardcoded copyright string. Last 10 █
█ bytes of the key must be equal to MD5 value of decryption result. The █
█ decryption result contains another Blowfish key, along with one more █
█ MD5 digest and DSA signature and public key. Also it contains one █
█ more encrypted buffer. This buffer gets decrypted with BF key 2, then █
█ the hash is taken and compared to the above MD5 value. If they're █
█ equal, then DSA signature for this hash is verifyed. If it's valid, █
█ routine continues. Last decrypted buffer contains key chunks, each █
█ (quite) of them contains small header with chunk type, customer █
█ number etc. along with chunk data and (again) DSA signature and █
█ public key. If signatures are ok in all chunks (this time they're █
█ verified using SHA-1), the key is nearly acctepted, but the following █
█ checks has little to do with cryptography. █
█ █
█ DSA is used with 512bit large prime. Only P, G and Q are hardcoded in █
█ the executables. Public key is in the keyfile. Very stupid. █
█ █
█ Pretty complex, eh? But it's all vain. I'd suggest ISS to fire the █
█ guy who implemented the protection because he's obviously not a █
█ specialist in this field. Heh, it's kind of ironic... program that █
█ scans for others' security flaws has a big hole inside... █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ VERIFICATION ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Due to the every day increasing amount of lamers who fake DAMN █
█ releases ALL DAMN releases starting from July 1, 2000 are digitally █
█ signed. █
█ █
█ Download DAMN Release Signature Verificator from http://www.damn.to █
█ (about 100K only) if you want to be sure that release you got was █
█ really made by DAMN. █
█ █
█ Don't use any stuff claiming to be made by DAMN if it's released █
█ after July 1, 2000 and doesn't pass verification. Using it can be █
█ dangerous. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ GREETINGS ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Our greetings fly to all groups and crackers who work hard to keep █
█ the Scene alive. █
█ █
█ Personal greetings to: egis, Dimedrol, Duelist, Quantico, Recca, █
█ russ97, tHE EGOiSTE. █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
│╒══════════════════╕ ╓─ ──── ─ ──══── ─ ────── ─ ────── ─ ──══── ─ ──── ─┤
┌┴┤▌ CONTACT ▐├─╜ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ └┐
█ ╘══════════════════╛ █
█ █
█ Visit our www site at [ http://www.damn.to ] █
█ Backup page [ http://damn.da.ru ] █
█ █
█ Email address for contacts [ [email protected] ] █
█ █
└┐ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┌┘
└─ ────── ─ ──══── ─ ────── ┬ ────── ─ ────── ┬ ────── ─ ──══── ─ ────── ─┘
│▌ (c) 2000 DAMN ▐│
└ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ┘
----------------------- DAMN RELEASE SIGNATURE START ------------------------
damn_iss61f.exe 1 g6ypFebk5LTuFUfmEQ2WPH6jaSg qt/LKRiOmt1DZBw1uiDTA1sCEoc
damn.nfo 0 MQpy2r7740K2cUprJSNC2yOA9d8 Ws2GfGJiUD6dxb8348/EfQVo4as
------------------------ DAMN RELEASE SIGNATURE END -------------------------