If you can load RCM and then send Hekate, you can extract the keys through Lockpick_RCM.I’m trying to recover data from a decimated switch. And this feels like a start, but I need to understand more. Is there a primer for how the keys are stored and what they are used for? I’ve figured you can’t just yank the chip board out of one switch and plop it into another because it’s encrypted with keys that may be situated elsewhere on the machine, but where they are and if they’re even accessible given the damage to my device is what I’m trying to figure out.

