Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

JA3 support #56

Open
chrisforce1 opened this issue Mar 25, 2018 · 1 comment
Open

JA3 support #56

chrisforce1 opened this issue Mar 25, 2018 · 1 comment
Assignees

Comments

@chrisforce1
Copy link
Contributor

I'd like to save JA3 signatures when NFR encounters TLS sessions on TCP port 443.

Here's a simple way that we can load tcpdump output into ja3.py and get the signatures. The code is over at https://github.com/salesforce/ja3/ and a large list of signatures at https://github.com/salesforce/ja3/tree/master/lists. We can then use the signatures on the backend to flag infections within riswiz.

@chrisforce1
Copy link
Contributor Author

A bigger list of JA3 signatures (including some malware) is over here.

@krhubert krhubert removed their assignment Dec 1, 2018
@ioj ioj removed their assignment Oct 23, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants