Package: python3-dheater Source: dheater Version: 0.3.2-1 Architecture: all Maintainer: Szilárd Pfeiffer Installed-Size: 50 Depends: python3-attr (>= 19.2.0), python3-urllib3, python3:any Filename: ./all/python3-dheater_0.3.2-1_all.deb Size: 9720 MD5sum: 87c7c7ea70dfaab69de0528ac4b4dc4a SHA1: a4e4f238567fd9336124e55b2afadd7ce3e9e382 SHA256: b7fb3cdb9f7f679efaab1bab1bcc72837db014f355ebec4d9b28f4bf6d2c9f52 Section: python Priority: optional Homepage: https://github.com/balasys/dheater Description: D(HE)ater is an attacking tool heating the CPU by enforcing # D(HE)ater . D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of [Diffie-Hellman key exchange](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) (DHE) in given cryptography protocols (e.g. TLS, SSH). It is performed without calculating a cryptographically correct ephemeral key on the client-side, but with a significant amount of calculation on the server-side. Based on this, a [denial-of-service (DoS) attack](https://en.wikipedia.org/wiki/Denial-of-service_attack) can be initiated, called *D(HE)at attack* ([CVE-2002-20001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-20001)). . ## Quick start . D(HE)ater can be installed directly via [pip](https://pip.pypa.io/en/stable/) from [PyPi](https://pypi.org/project/dheater/) . ```console pip install dheater dheat --protocol tls ecc256.badssl.com dheat --protocol ssh ecc256.badssl.com ```