Package: python3-dheater
Source: dheater
Version: 0.3.0-1
Architecture: all
Maintainer: Szilárd Pfeiffer <szilard.pfeiffer@balasys.hu>
Installed-Size: 52
Depends: python3-attr (>= 19.1), python3-urllib3, python3:any
Filename: all/python3-dheater_0.3.0-1_all.deb
Size: 9872
MD5sum: b4339a5b545e9fe6ae9244152e672955
SHA1: 41e8b6b7afb3bbf1574027c943144822bd0f4c2f
SHA256: 6231ab997c21d8bf4330e93272e99b779a2c13b9734626eb2d60a0416a436c1a
Section: python
Priority: optional
Homepage: https://github.com/balasys/dheater
Description: D(HE)ater is an attacking tool heating the CPU by enforcing
 # D(HE)ater
 .
 D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of
 [Diffie-Hellman key exchange](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) (DHE) in given
 cryptography protocols (e.g. TLS, SSH). It is performed without calculating a cryptographically correct ephemeral key on
 the client side, but with a significant amount of calculation on the server side. Based on this,
 a [denial-of-service (DoS) attack](https://en.wikipedia.org/wiki/Denial-of-service_attack) attack can be initiated,
 called *D(HE)at attack* ([CVE-2002-20001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-20001)).
 .
 ## Quick start
 .
 D(HE)ater can be installed directly via [pip](https://pip.pypa.io/en/stable/) from
 [PyPi](https://pypi.org/project/dheater/)
 .
 ```console
 pip install dheater
 dheat --protocol tls ecc256.badssl.com
 dheat --protocol ssh ecc256.badssl.com
 ```

