Package Details: aeskeyfind 1.0-2

Git Clone URL: https://aur.archlinux.org/aeskeyfind.git (read-only, click to copy)
Package Base: aeskeyfind
Description: automatic techniques for locating 128-bit and 256-bit AES keys in a captured memory image
Upstream URL: https://citp.princeton.edu/research/memory/
Licenses: GPL
Submitter: dracorp
Maintainer: dracorp
Last Packager: dracorp
Votes: 0
Popularity: 0.000000
First Submitted: 2015-11-22 20:02 (UTC)
Last Updated: 2017-09-25 19:38 (UTC)

Latest Comments

dracorp commented on 2017-09-25 19:32 (UTC)

https://github.com/DonnchaC/coldboot-attacks

Pineman13 commented on 2016-12-03 09:09 (UTC) (edited on 2016-12-03 09:10 (UTC) by Pineman13)

All of the external websites keep on referencing Princeton University codebase. Which is broken. There's plenty of binaries for those out there. But I was utterly unable to find any other distributor of source code other than the one dracorp mentioned. As a workaround you can use Black Arch binaries for both aes and rsa keyfind. My searches had also shown that some of the BSD-related sites could have the sources. This one, for instance, has the original coldboot memory image dumper from the Princeton University: https://people.freebsd.org/~wpaul/bios_memimage-1.2.tar.gz But alas it still doesn't have the keyfinder code.

dracorp commented on 2016-10-13 17:47 (UTC)

https://citp.princeton.edu/research/memory/code/ and not found for aeskeyfind. There is problem with the site.