timing_attack 0.7.0 → 0.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/exe/timing_attack +1 -1
- data/lib/timing_attack/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c4fb954a1fce372121d171042ae672fd8f1008a9
|
4
|
+
data.tar.gz: b02a30bceff2e87a13ba5e269ea40086065aa892
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8d4ced390faae4ea12a6c86b632ecb3137a221d04ef88e16fa5f0de6f52d06b6b27d27ffe9436fb50a1768e56124fe08dbddb0280a47597b3d4d7ab35bd8886d
|
7
|
+
data.tar.gz: c18970599cd6032b5b9fbcf5e73d63ff313ba6ae6d408b70c4f808c657a9d1fbe0f47ac7524bfa1cd372e1222abd752293dd4b48bd4f3c9e142da26e8bdd0e68
|
data/README.md
CHANGED
@@ -1,4 +1,4 @@
|
|
1
|
-
](https://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
|
2
2
|
[](http://badge.fury.io/rb/timing_attack)
|
3
3
|
|
4
4
|
# timing_attack
|
@@ -157,7 +157,7 @@ with percentiles above ~15, median, and mean are all quite noisy, so you should
|
|
157
157
|
probably keep `--percentile` low.
|
158
158
|
|
159
159
|
I was very surprised to find that I get correct results against remote targets
|
160
|
-
with `--
|
160
|
+
with `--number` around 20. Default is 50, as that has been sufficient in my tests
|
161
161
|
for LAN and local targets.
|
162
162
|
|
163
163
|
## Contributing
|
data/exe/timing_attack
CHANGED
@@ -53,7 +53,7 @@ class TimingAttackCli
|
|
53
53
|
opts.on("-q", "--quiet", "Quiet mode (don't display progress bars)") { |bool| options[:verbose] = !bool }
|
54
54
|
opts.on("-b", "--brute-force", "Brute force mode") { |bool| options[:brute_force] = bool }
|
55
55
|
opts.on("-i FILE", "--inputs-file FILE", "Read inputs from specified file, one per line") do |str|
|
56
|
-
options[:inputs] = flat_file(
|
56
|
+
options[:inputs] = flat_file(str)
|
57
57
|
end
|
58
58
|
opts.on("--parameters STR", "JSON hash of URL parameters. 'INPUT' will be replaced with the attack string") do |str|
|
59
59
|
options[:params] = JSON.parse(str)
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: timing_attack
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.7.
|
4
|
+
version: 0.7.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Forrest Fleming
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2019-04-06 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: ruby-progressbar
|