@@ -13,7 +13,7 @@ called [D(HE)at attack](https://dheatattack.com)
13
13
D(HE)ater can be installed directly via [ pip] ( https://pip.pypa.io/en/stable/ ) from
14
14
[ PyPi] ( https://pypi.org/project/dheater/ )
15
15
16
- ```
16
+ ``` shell
17
17
pip install dheater
18
18
dheat --protocol tls ecc256.badssl.com
19
19
dheat --protocol ssh ecc256.badssl.com
@@ -22,15 +22,15 @@ dheat --protocol ssh ecc256.badssl.com
22
22
or can be used via [ Docker] ( https://www.docker.com/ ) from
23
23
[ Docker Hub] ( https://hub.docker.com/repository/docker/coroner/dheater )
24
24
25
- ```
25
+ ``` shell
26
26
docker pull coroner/dheater
27
27
docker run --tty --rm coroner/dheater --protocol tls ecc256.badssl.com
28
28
docker run --tty --rm coroner/dheater --protocol ssh ecc256.badssl.com
29
29
```
30
30
31
31
You can increase load by string extra threads.
32
32
33
- ```
33
+ ``` shell
34
34
dheat --thread-num 4 --protocol tls ecc256.badssl.com
35
35
docker run --tty --rm coroner/dheater --thread-num 4 --protocol tls ecc256.badssl.com
36
36
docker run --tty --rm coroner/dheater --thread-num 4 --protocol ssh ecc256.badssl.com
@@ -47,7 +47,7 @@ DH parameters (prime, generator, key size) are used. Command line tools such as
47
47
48
48
### TLS
49
49
50
- ```
50
+ ``` shell
51
51
cryptolyze tls1_2 dhparams example.com
52
52
cryptolyze tls1_3 dhparams example.com
53
53
@@ -56,7 +56,7 @@ testssl.sh --fs example.com
56
56
57
57
### SSH
58
58
59
- ```
59
+ ``` shell
60
60
cryptolyze ssh2 dhparams example.com
61
61
62
62
ssh-audit example.com
@@ -127,7 +127,7 @@ security risk.
127
127
You can check whether you DH parameter file contains the recommended private
128
128
key value by the following command:
129
129
130
- ```
130
+ ```shell
131
131
dh_param_priv_key_size_setter /path/to/dh/parameter/file.pem
132
132
```
133
133
0 commit comments