Package: python3-dheater
Source: dheater
Version: 0.3.0-1
Architecture: all
Maintainer: Szilárd Pfeiffer <szilard.pfeiffer@balasys.hu>
Installed-Size: 51
Depends: python3-attr (>= 19.1), python3-urllib3, python3:any
Filename: ./all/python3-dheater_0.3.0-1_all.deb
Size: 9800
MD5sum: 0709f0ec19770aab4d0961c7ca69881f
SHA1: 06f5e7f49a66e53be000c6660d2420d9817b3b6f
SHA256: 70193048ec2d9d7cfcb5b5ad52d63673943f1e89198f097b4ccc09273ad7e587
Section: python
Priority: optional
Homepage: https://github.com/balasys/dheater
Description: D(HE)ater is an attacking tool heating the CPU by enforcing
 # D(HE)ater
 .
 D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of
 [Diffie-Hellman key exchange](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) (DHE) in given
 cryptography protocols (e.g. TLS, SSH). It is performed without calculating a cryptographically correct ephemeral key on
 the client side, but with a significant amount of calculation on the server side. Based on this,
 a [denial-of-service (DoS) attack](https://en.wikipedia.org/wiki/Denial-of-service_attack) attack can be initiated,
 called *D(HE)at attack* ([CVE-2002-20001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-20001)).
 .
 ## Quick start
 .
 D(HE)ater can be installed directly via [pip](https://pip.pypa.io/en/stable/) from
 [PyPi](https://pypi.org/project/dheater/)
 .
 ```console
 pip install dheater
 dheat --protocol tls ecc256.badssl.com
 dheat --protocol ssh ecc256.badssl.com
 ```