Skip to main content

Recover your RSA SecurID key from your memory dumps!

Project description

stoken_bfasst: SecurID Token BruteForce Assistant

Why

Consider the following.

You lost the original "sdtid" file that contains your RSA SecurID soft token file, and for whatever reason the tokencode generator program doesn't implement a way to export it back to a sdtid file. However, you can easily create a memory dump of the program while it has your soft token loaded in memory. How can you quickly search through that memory dump to find your secret seed and rebuild a sdtid file (which you will definitely back up properly this time)?

This library lets you do that.

How to use

I am tired so there are no proper docs. Read tests/test_search.py and the public function docstrings.

Sorry.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

stoken_bfasst-1.1.0.tar.gz (14.5 kB view details)

Uploaded Source

File details

Details for the file stoken_bfasst-1.1.0.tar.gz.

File metadata

  • Download URL: stoken_bfasst-1.1.0.tar.gz
  • Upload date:
  • Size: 14.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.2

File hashes

Hashes for stoken_bfasst-1.1.0.tar.gz
Algorithm Hash digest
SHA256 9614d7f330fc4f2782eeb4359fcfb2ec1e98644973ba6ec97df58ae9a1d30f28
MD5 358e6c287d6dfe135d619c8825fc3518
BLAKE2b-256 10b440e55c42bc3d9c14575ea3cb18823391d33ecf121b3cd0de5fe860e3fdaa

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page