Package: python3-dheater
Source: dheater
Version: 0.3.1-1
Architecture: all
Maintainer: Szilárd Pfeiffer <szilard.pfeiffer@balasys.hu>
Installed-Size: 50
Depends: python3-attr (>= 19.1), python3-urllib3, python3:any
Filename: ./all/python3-dheater_0.3.1-1_all.deb
Size: 9700
MD5sum: 98ac93100cc1822a41e73ab38065d937
SHA1: 2b1d0269ad48e6a1869a4cf712eafa61ecede142
SHA256: 6881a6bbf1cc0a9cbc3bab509033a0ac59a4341a71ef35cfcaa982506d31d584
Section: python
Priority: optional
Homepage: https://github.com/balasys/dheater
Description: D(HE)ater is an attacking tool heating the CPU by enforcing
 # D(HE)ater
 .
 D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of
 [Diffie-Hellman key exchange](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) (DHE) in given
 cryptography protocols (e.g. TLS, SSH). It is performed without calculating a cryptographically correct ephemeral key on
 the client-side, but with a significant amount of calculation on the server-side. Based on this,
 a [denial-of-service (DoS) attack](https://en.wikipedia.org/wiki/Denial-of-service_attack) can be initiated,
 called *D(HE)at attack* ([CVE-2002-20001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-20001)).
 .
 ## Quick start
 .
 D(HE)ater can be installed directly via [pip](https://pip.pypa.io/en/stable/) from
 [PyPi](https://pypi.org/project/dheater/)
 .
 ```console
 pip install dheater
 dheat --protocol tls ecc256.badssl.com
 dheat --protocol ssh ecc256.badssl.com
 ```