app:tlsfingerprint
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| app:tlsfingerprint [2017/11/29 13:13] – [TLS Fingerprinter] vivek | app:tlsfingerprint [2018/03/04 13:27] (current) – veera | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ~~Title: TLS Fingerprinting ~~ | + | ~~Title: TLS Fingerprinting |
| ====== TLS Fingerprinter ====== | ====== TLS Fingerprinter ====== | ||
| Line 12: | Line 12: | ||
| ===== What is TLS Fingerprinting ===== | ===== What is TLS Fingerprinting ===== | ||
| - | This technique builds upon the patterns found in the client | + | This technique builds upon the patterns found in the preferences that are advertised in the " |
| The 3 major fields in the Client Hello that can identify a client are | The 3 major fields in the Client Hello that can identify a client are | ||
| Line 22: | Line 22: | ||
| So if you take all the three together there is a high likelyhood that you can minimize collisions and identify a particular client on a particular operating system.If you printed out the values of all these three fields and then computed a MD5 hash over the string, we can get a ' | So if you take all the three together there is a high likelyhood that you can minimize collisions and identify a particular client on a particular operating system.If you printed out the values of all these three fields and then computed a MD5 hash over the string, we can get a ' | ||
| - | At first, this approach may seem a bit flaky but it is not easy for an application to change its //print// dynamically without some major code rewrite. We currently have about 300 hashes largely due to Lee Brotherston' | + | At first, this approach may seem a bit flaky but it is not easy for an application to change its //print// dynamically without some major code rewrite. We currently have about 300 hashes largely due to Lee Brotherston' |
| - | Links | + | < |
| + | Further reading | ||
| * [[https:// | * [[https:// | ||
| + | * [[https:// | ||
| * [[https:// | * [[https:// | ||
| + | </ | ||
| ==== Fingerprints database ==== | ==== Fingerprints database ==== | ||
| Line 43: | Line 45: | ||
| ==== Analysis of TLS Fingerprints ==== | ==== Analysis of TLS Fingerprints ==== | ||
| - | What are you going to do with these prints. There are a few options | + | There are two actionable things |
| + | |||
| * **Malware prints** | * **Malware prints** | ||
| * **Anomaly detection** : If you can track known prints,then you can build a large Database over a period of time. After that you can send unseen prints into a " | * **Anomaly detection** : If you can track known prints,then you can build a large Database over a period of time. After that you can send unseen prints into a " | ||
| - | |||
| - | In both analysis paths,we think TLS Prints is a valuable piece of intel, especially given we are moving to pervasive TLS. | ||
| - | |||
| - | Lets look at what you can do with TrisulNSM and the new TLS Prints App. | ||
| Line 99: | Line 97: | ||
| ===== Programatically resolving TLS Prints ===== | ===== Programatically resolving TLS Prints ===== | ||
| - | This App dumps all fingerprints along with the parameters used to compute them and the TCP Flow details in a log file. In another article we will outline how we can programatically | + | This App dumps all fingerprints along with the parameters used to compute them into a log file. This allows us to programatically |
app/tlsfingerprint.1511941405.txt.gz · Last modified: 2017/11/29 13:13 by vivek