eapki

module
v0.1.3 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Oct 26, 2024 License: MIT

README

eapki

EAPKI toolkit

Usage

EAPKI toolkit

Usage:
  eapki [command]

Available Commands:
  dump        Dump the contents of an encrypted filesystem
  fcheck      Perform file integrity check
  help        Help about any command
  keyring     Create keyring dump
  obfuscate   Obfuscate or deobfuscate files used early in the eapki client's boot process (kbt.dll, etc...)
  p7e         Decrypt PKCS #7 encrypted files (kdm.dll, etc...)
  path        Convert a path/filename to an obfuscated drmfs path
  pins        List possible dongle pins
  proxy       Start authentication proxy

Flags:
  -h, --help   help for eapki

Use "eapki [command] --help" for more information about a command.

Environment Variables

PKCS11_MODULE: Path to the PKCS11 module. If left blank, a platform specific default will be used instead.

Dumping drmfs

After connecting your license key, you can dump the contents of an encrypted filesystem by running eapki dump SOURCE DESTINATION.

After a successful dump, you may also perform a file check by running eapki fcheck DESTINATION DESTINATION/prop/filepath.xml.

Decrypting Other Files

Some files are encrypted outside the context of drmfs, with the most notable of these being avs2-core.dll, avs2-ea3.dll, and bootstrap.xml.

Assuming that you have their respective bootstrap.exe file, you can decrypt these files by running eapki obfuscate BOOTSTRAP FILES...

Directories

Path Synopsis
cmd
tools

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL