app:tlsfingerprint
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| app:tlsfingerprint [2017/11/29 00:01] – [How the TrisulNSM App works] veera | app:tlsfingerprint [2018/03/04 13:27] (current) – veera | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ~~Title: TLS Fingerprinting using Trisul ~~ | ||
| + | |||
| ====== TLS Fingerprinter ====== | ====== TLS Fingerprinter ====== | ||
| Line 10: | Line 12: | ||
| ===== What is TLS Fingerprinting ===== | ===== What is TLS Fingerprinting ===== | ||
| - | This technique builds upon the patterns found in the client | + | This technique builds upon the patterns found in the preferences that are advertised in the " |
| The 3 major fields in the Client Hello that can identify a client are | The 3 major fields in the Client Hello that can identify a client are | ||
| Line 20: | Line 22: | ||
| So if you take all the three together there is a high likelyhood that you can minimize collisions and identify a particular client on a particular operating system.If you printed out the values of all these three fields and then computed a MD5 hash over the string, we can get a ' | So if you take all the three together there is a high likelyhood that you can minimize collisions and identify a particular client on a particular operating system.If you printed out the values of all these three fields and then computed a MD5 hash over the string, we can get a ' | ||
| - | At first, this approach may seem a bit flaky but it is not easy for an application to change its //print// dynamically without some major code rewrite. We currently have about 300 hashes largely due to Lee Brotherston' | + | At first, this approach may seem a bit flaky but it is not easy for an application to change its //print// dynamically without some major code rewrite. We currently have about 300 hashes largely due to Lee Brotherston' |
| - | Links | + | < |
| + | Further reading | ||
| * [[https:// | * [[https:// | ||
| + | * [[https:// | ||
| * [[https:// | * [[https:// | ||
| + | </ | ||
| ==== Fingerprints database ==== | ==== Fingerprints database ==== | ||
| Line 39: | Line 43: | ||
| - | ===== Analysis of TLS Fingerprints ===== | + | ==== Analysis of TLS Fingerprints ==== |
| + | |||
| + | There are two actionable things you can do with these prints | ||
| - | What are you going to do with these prints. There are a few options | ||
| - | |||
| * **Malware prints** | * **Malware prints** | ||
| * **Anomaly detection** : If you can track known prints,then you can build a large Database over a period of time. After that you can send unseen prints into a " | * **Anomaly detection** : If you can track known prints,then you can build a large Database over a period of time. After that you can send unseen prints into a " | ||
| - | |||
| - | In both analysis paths,we think TLS Prints is a valuable piece of intel, especially given we are moving to pervasive TLS. | ||
| - | |||
| - | Lets look at what you can do with TrisulNSM and the new TLS Prints App. | ||
| Line 95: | Line 95: | ||
| When you reveal adjacent vertices in [[https:// | When you reveal adjacent vertices in [[https:// | ||
| - | ==== Programatically resolving TLS Prints ==== | + | ===== Programatically resolving TLS Prints |
| - | The TrisulNSM TLS-Print | + | This App dumps all fingerprints |
| - | If you can access | + | We invite |
| - | + | ||
| - | + | ||
| - | + | ||
app/tlsfingerprint.1511893916.txt.gz · Last modified: 2017/11/29 00:01 by veera