Hi everyone,
This is my first post. Enjoy.
This procedure is to do a Password Recovery of the admin account.
The procedure is similar to the one specified in sk92663, but with some changes. I am not modify any system files.
Tested in R81, R81.10.
Not test in R80.XX, buy i think will be work
Prerequisites:
- live linux CD (in my case i will be use ubuntu iso)
- Another virtual, server or PC with linux (Any distro)
- "Another linux" and CheckPoint Management must have network connection.
1) boot live linux,

2) Preparing "Another linux"
Generate the id_rsa, with the following command
ssh-keygen

3) in Linux live we install ssh, because it does not come by default, and we change the default user password that comes by default. In my case it is "Ubuntu".


4) Log in via ssh to the live Linux and paste the following commands as root:
Note: This commands are parts of sk92663
sudo su
mkdir /mnt/gaia
mount /dev/vg_splat/lv_current /mnt/gaia
mount /dev/vg_splat/lv_log /mnt/gaia/var/log
mount /dev/sda1 /mnt/gaia/boot
mount --bind /dev /mnt/gaia/dev
mount --bind /proc /mnt/gaia/proc
mount --bind /sys /mnt/gaia/sys
chroot /mnt/gaia /bin/bash

5) Set the following command and paste it, the user and IP are from the "Another Linux".
ssh user@<ip address> cat .ssh/id_rsa.pub | tee -a /home/admin/.ssh/authorized_keys

This command como the content form id_rsa.pub to authorized_keys
6) Reboot Management

7) When it finishes booting, log in via ssh with the admin user, from the "Another Linux" and you should log in without password.
ssh admin@<ip address>

8) Now we can change admin password from clish.
-----------
Any suggestions or comments are welcome
mnocciolino