Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s
 
 
Go to file
Jean-Louis Huynen d6d9f8a111 Adds sha256 hash of each certificates 2019-02-04 13:55:58 +01:00
etls
.gitignore
LICENSE
Makefile
README.md Adds basic tlsh support 2019-02-04 09:02:57 +01:00
d4-tlsf.go Adds sha256 hash of each certificates 2019-02-04 13:55:58 +01:00

README.md

sensor-d4-tls-fingerprinting

Extracts TLS certificates from pcap files or network interfaces (tcpreassembly is done thanks to gopacket), fingerprints TLS client/server interactions with ja3/ja3s and print output in JSON form.

Use

This project is currently in its very early stage and should not be used in production. Check the list of issues.

Install dependencies & go get

$go get github.com/google/gopacket
$go get github.com/glaslos/tlsh 
$go get github.com/D4-project/sensor-d4-tls-fingerprinting

make allows to compile for amd64 and arm ATM.

How to use

Read from pcap:

$ ./d4-tlsf-amd64l -r=file 

Read from interface (promiscious mode):

$ ./d4-tlsf-amd64l -i=interface 

Write x509 certificates to folder:

$ ./d4-tlsf-amd64l -w=folderName 

Write output json inside folder

$ ./d4-tlsf-amd64l -j=folderName