Recover your RSA SecurID key from your memory dumps!
Project description
stoken_bfasst: SecurID Token BruteForce Assistant
Why
Consider the following.
You lost the original "sdtid" file that contains your RSA SecurID soft token file, and for whatever reason the tokencode generator program doesn't implement a way to export it back to a sdtid file. However, you can easily create a memory dump of the program while it has your soft token loaded in memory. How can you quickly search through that memory dump to find your secret seed and rebuild a sdtid file (which you will definitely back up properly this time)?
This library lets you do that.
How to use
I am tired so there are no proper docs. Read tests/test_search.py and the public function docstrings.
Sorry.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file stoken_bfasst-1.1.0.tar.gz.
File metadata
- Download URL: stoken_bfasst-1.1.0.tar.gz
- Upload date:
- Size: 14.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.11.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
9614d7f330fc4f2782eeb4359fcfb2ec1e98644973ba6ec97df58ae9a1d30f28
|
|
| MD5 |
358e6c287d6dfe135d619c8825fc3518
|
|
| BLAKE2b-256 |
10b440e55c42bc3d9c14575ea3cb18823391d33ecf121b3cd0de5fe860e3fdaa
|