How to Install and Uninstall aeskeyfind.x86_64 Package on Fedora 34
Last updated: November 17,2024
1. Install "aeskeyfind.x86_64" package
In this section, we are going to explain the necessary steps to install aeskeyfind.x86_64 on Fedora 34
$
sudo dnf update
Copied
$
sudo dnf install
aeskeyfind.x86_64
Copied
2. Uninstall "aeskeyfind.x86_64" package
Learn how to uninstall aeskeyfind.x86_64 on Fedora 34:
$
sudo dnf remove
aeskeyfind.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the aeskeyfind.x86_64 package on Fedora 34
Last metadata expiration check: 1:53:42 ago on Tue Sep 6 02:10:55 2022.
Available Packages
Name : aeskeyfind
Version : 1.0
Release : 10.fc34
Architecture : x86_64
Size : 18 k
Source : aeskeyfind-1.0-10.fc34.src.rpm
Repository : fedora
Summary : Locate 128-bit and 256-bit AES keys in a captured memory image
URL : https://citp.princeton.edu/our-work/memory/
License : BSD
Description : This program illustrates automatic techniques for locating 128-bit and
: 256-bit AES keys in a captured memory image.
:
: The program uses various algorithms and also performs a simple entropy
: test to filter out blocks that are not keys. It counts the number of
: repeated bytes and skips blocks that have too many repeats.
:
: This method works even if several bits of the key schedule have been
: corrupted due to memory decay.
:
: This package is useful to several activities, as forensics investigations.
Available Packages
Name : aeskeyfind
Version : 1.0
Release : 10.fc34
Architecture : x86_64
Size : 18 k
Source : aeskeyfind-1.0-10.fc34.src.rpm
Repository : fedora
Summary : Locate 128-bit and 256-bit AES keys in a captured memory image
URL : https://citp.princeton.edu/our-work/memory/
License : BSD
Description : This program illustrates automatic techniques for locating 128-bit and
: 256-bit AES keys in a captured memory image.
:
: The program uses various algorithms and also performs a simple entropy
: test to filter out blocks that are not keys. It counts the number of
: repeated bytes and skips blocks that have too many repeats.
:
: This method works even if several bits of the key schedule have been
: corrupted due to memory decay.
:
: This package is useful to several activities, as forensics investigations.