timing_attack 0.7.0 → 0.7.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/exe/timing_attack +1 -1
- data/lib/timing_attack/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c4fb954a1fce372121d171042ae672fd8f1008a9
|
4
|
+
data.tar.gz: b02a30bceff2e87a13ba5e269ea40086065aa892
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8d4ced390faae4ea12a6c86b632ecb3137a221d04ef88e16fa5f0de6f52d06b6b27d27ffe9436fb50a1768e56124fe08dbddb0280a47597b3d4d7ab35bd8886d
|
7
|
+
data.tar.gz: c18970599cd6032b5b9fbcf5e73d63ff313ba6ae6d408b70c4f808c657a9d1fbe0f47ac7524bfa1cd372e1222abd752293dd4b48bd4f3c9e142da26e8bdd0e68
|
data/README.md
CHANGED
@@ -1,4 +1,4 @@
|
|
1
|
-
![
|
1
|
+
[![Black Hat Arsenal]( https://github.com/toolswatch/badges/blob/master/arsenal/usa/2017.svg)](https://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)
|
2
2
|
[![Gem Version](https://badge.fury.io/rb/timing_attack.svg)](http://badge.fury.io/rb/timing_attack)
|
3
3
|
|
4
4
|
# timing_attack
|
@@ -157,7 +157,7 @@ with percentiles above ~15, median, and mean are all quite noisy, so you should
|
|
157
157
|
probably keep `--percentile` low.
|
158
158
|
|
159
159
|
I was very surprised to find that I get correct results against remote targets
|
160
|
-
with `--
|
160
|
+
with `--number` around 20. Default is 50, as that has been sufficient in my tests
|
161
161
|
for LAN and local targets.
|
162
162
|
|
163
163
|
## Contributing
|
data/exe/timing_attack
CHANGED
@@ -53,7 +53,7 @@ class TimingAttackCli
|
|
53
53
|
opts.on("-q", "--quiet", "Quiet mode (don't display progress bars)") { |bool| options[:verbose] = !bool }
|
54
54
|
opts.on("-b", "--brute-force", "Brute force mode") { |bool| options[:brute_force] = bool }
|
55
55
|
opts.on("-i FILE", "--inputs-file FILE", "Read inputs from specified file, one per line") do |str|
|
56
|
-
options[:inputs] = flat_file(
|
56
|
+
options[:inputs] = flat_file(str)
|
57
57
|
end
|
58
58
|
opts.on("--parameters STR", "JSON hash of URL parameters. 'INPUT' will be replaced with the attack string") do |str|
|
59
59
|
options[:params] = JSON.parse(str)
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: timing_attack
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.7.
|
4
|
+
version: 0.7.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Forrest Fleming
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2019-04-06 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: ruby-progressbar
|