Checkpoint How to use R80.10 API for Automation and Streamlined Security webcast main points

Just took part in the webcast by Checkpoint How to use R80.10 API for Automation and Streamlined Security and here are some thoughts about it. API is all about working with Management server (but read on) We can set some things on a firewall Gateway as well via API …



HIEW tutorial hexadecimal editor part 5 using Crypto module to program a keygen

Commands used in the video: Command Action F3 + F7 Open the Crypto window to start entering ASM commands to be run by HIEW on the file contents Ctrl + F7 Re-open the Crypto window to change the commands F7 Apply the entered commands to the data at the current cursor position …



HIEW tutorial hexadecimal editor part 3 Navigation

Commands used in the video: Commands Action F8 + F5 jump to the Entry Point in the program. Shift + "+" Add a bookmark at the current cursor position. Alt + 1 / Alt + 2 / Alt + nn Jump to the 1st, 2nd , nn-th bookmark. Alt + "-" Remove the bookmark at the current position. Alt + 0 Remove …



HIEW tutorial hexadecimal editor part 4 encrypting decrypting with XOR

Commands used in the video: Command Action F3 + F8 Set the XOR ASCII/Hex string to be used as a key to XOR with the file data F8 Apply 1 step of XOR operation to the data at the current cursor position. cryptopals.com challenge Challenge used as an example …



Binary obfuscation - String obfuscating in C

The first step in reversing any binary for any purpose is to try and elicit any meaningful information that is most easy to retrieve. One such information is clear text strings in the binary. They may disclose a lot of information if the programmer did not take care to remove …



How to manually install Security Policy via cli on Checkpoint Gaia.

The usual way to install a policy is by clicking Install in the SmartDashboard of course, but if need arises to do so from the command line of the Checkpoint Management server we do it this way: fwm load



The one command to clear ALL the connections on a Checkpoint firewall - use with care

Checkpoint firewalls are pretty dynamic and interactive to our changes, for the most of the changes done by administrator it is enough to install the policy for the changes to take immediate effect. In the rare cases when changes (seemingly) do not take effect, it is probably because the particular …



What ports 18190 18209 18210 18211 in Checkpoint are used for

What ports 18190, 18209, 18210, 18211, in Checkpoint are used for ? For the correct functioning the Checkpoint uses quite a lot of ports, some are a must some or not. The ports listed above are in ‘a must’ category. Let’s see: 18190 for R77.x/19009 for R80+ (NOTE …



HIEW Hex editor tutorials series , part 2 – the basics.

Round up of the basic HIEW commands used: Command Action Change the color scheme edit hiew8.ini the last section "Colors", set ColorMain = 0x07 to have the black background. ESC To exit any window/mode without saving the changes. F1 Context-sensitive help. F3 Enter the Edit mode. ENTER In the …



HIEW Hex editor tutorials series , part 1 – the history.

The story of this hex editor started in the dark 90-s. The first name was ViHE (Viewer-HexEditor) and was released by its author Eugene Suslikov as a free software in early 1991. As he stated back then “for occasional looking into and changing few bytes in a file, like 7xh …