Skip to main content

Recover your RSA SecurID key from your memory dumps!

Project description

stoken_bfasst: SecurID Token BruteForce Assistant

Why

Consider the following.

You lost the original "sdtid" file that contains your RSA SecurID soft token file, and for whatever reason the tokencode generator program doesn't implement a way to export it back to a sdtid file. However, you can easily create a memory dump of the program while it has your soft token loaded in memory. How can you quickly search through that memory dump to find your secret seed and rebuild a sdtid file (which you will definitely back up properly this time)?

This library lets you do that.

How to use

I am tired so there are no proper docs. Read tests/test_search.py and the public function docstrings.

Sorry.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

stoken_bfasst-1.0.0.tar.gz (14.5 kB view details)

Uploaded Source

File details

Details for the file stoken_bfasst-1.0.0.tar.gz.

File metadata

  • Download URL: stoken_bfasst-1.0.0.tar.gz
  • Upload date:
  • Size: 14.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.11.2

File hashes

Hashes for stoken_bfasst-1.0.0.tar.gz
Algorithm Hash digest
SHA256 8e9e990c697c84f864e8fa0535a8374b8b836915cfd606c855e5a5072bed983c
MD5 b1d506106f4de6cec0b32ee4d687830d
BLAKE2b-256 00b040136c90eeb89d3ffe27f6e2a1966aaca31a6ae1d748a051fc996b267f90

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page