-
Notifications
You must be signed in to change notification settings - Fork 291
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSLv2 in Python Script #29
Comments
@dcheel would you have, by any chance, a sample of the client hello you would like to log as a PCAP file that you could share? |
@dcheel Yes, if you have a pcap, it would be much easier to test and resolve. |
Sorry, for some reason these were going to spam for me. So I can't share the sampled I have at work unfortunately, but something like https://www.cloudshark.org/captures/7796ea1bb3f3, or https://www.cloudshark.org/captures/d94462c4f238 seem like examples of sslv2 client hellos that return no data from ja3:
|
For
So I have both a client and server JA3 fingerprint. NB: I use IVRE's version of the JA3 script, but the original should work just as well. This only explains the fact that I have Both signature start with Bro version 2.6.1 has been used here BTW. Update I missed the "in Python Script", I am not even able to read an issue title. So this comment is probably not helpful, but in case it helps anyway: that should work with Bro. |
i met the same problem, so i use scapy to make a new tool: https://github.com/Macr0phag3/ja3box it seems to work well |
When a piece of malware issues a SSLv2 client hello,
ja3.py
misses it. Can ja3 apply to SSLv2 hellos? I know there are no extensions, but that could just be blank.The text was updated successfully, but these errors were encountered: