Package: python3-dheater
Source: dheater
Version: 0.3.2-1
Architecture: all
Maintainer: Szilárd Pfeiffer <szilard.pfeiffer@balasys.hu>
Installed-Size: 51
Depends: python3-attr (>= 19.2.0), python3-urllib3, python3:any
Filename: all/python3-dheater_0.3.2-1_all.deb
Size: 9788
MD5sum: 56d557ac526440f6175700a49396336d
SHA1: d4b62789d9e67447a7c6d7cdec8bd6fa64027ebb
SHA256: 0489220c5f920a806f86407e64efb8c887761cc3668026247cd15c0d50be0f79
Section: python
Priority: optional
Homepage: https://github.com/balasys/dheater
Description: D(HE)ater is an attacking tool heating the CPU by enforcing
 # D(HE)ater
 .
 D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of
 [Diffie-Hellman key exchange](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) (DHE) in given
 cryptography protocols (e.g. TLS, SSH). It is performed without calculating a cryptographically correct ephemeral key on
 the client-side, but with a significant amount of calculation on the server-side. Based on this,
 a [denial-of-service (DoS) attack](https://en.wikipedia.org/wiki/Denial-of-service_attack) can be initiated,
 called *D(HE)at attack* ([CVE-2002-20001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-20001)).
 .
 ## Quick start
 .
 D(HE)ater can be installed directly via [pip](https://pip.pypa.io/en/stable/) from
 [PyPi](https://pypi.org/project/dheater/)
 .
 ```console
 pip install dheater
 dheat --protocol tls ecc256.badssl.com
 dheat --protocol ssh ecc256.badssl.com
 ```

