On 08/09/2012 09:57 PM, Michael Gissing wrote:
> You can use jTpmTools with jTSS[1] to view, decode, dump and play with a
> TPM's NV memory. The nv_decode command is your friend.

I totally forgot about the read_ekcert command.

$ jtt read_ekcert -o $OWNER_PW

The extracted file is than a well formated x509 certificate.

Michael


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
tboot-devel mailing list
tboot-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tboot-devel

Reply via email to