Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wasnt able to figure out how ... #119

Open
kolet opened this issue Sep 15, 2022 · 5 comments
Open

wasnt able to figure out how ... #119

kolet opened this issue Sep 15, 2022 · 5 comments

Comments

@kolet
Copy link

kolet commented Sep 15, 2022

hi there , i'd like to know if there is any tools to create ja3 finger prints .

all of the tools i've seen till now , are tools that are extracting ja3 finger prints and their md5 hash.

however i am looking for a tool that create "generate" those ja3 finger prints .
i think i saw something here about creating a ja3 however i wasnt able to reproduce it on my own.

help would be great !
thanks

@kasiusm
Copy link

kasiusm commented Sep 15, 2022

You mean this kind of tools: https://scrapfly.io/web-scraping-tools/ja3-fingerprint or https://tls.peet.ws/, the last one is open source: https://github.com/wwhtrbbtt/TrackMe/

But yes, with some changes (or from original x/crypto/tls) you can hook and expose the client hello to generate the fingerprint

@kolet
Copy link
Author

kolet commented Sep 15, 2022

no not that .

i am looking to generate new ja3 finger prints .

i am already extract all ja3 from my network through suricata .

i'd like to generate ja3 constantly untill i stop the script for example .

i tried example.go , however it generate mots of the time the same JA3 .

what i am looking for a generating hundreds - thousands of ja3 .

@kasiusm
Copy link

kasiusm commented Sep 16, 2022

You can use any http client and permute ciphers, tls version, curves (you dont need this lib) it will produce random ja3. The goal of profile here is to simulate well known browsers.

So it depends of your goals, if you want to spoof browser ja3, it's wrong to do random, each (one or many) version use the exact same ja3 on every request - having random / not matching ja3 is suspicious. That's why the exemple is always returning the same.

If it's for other purpose, then ok

@kolet
Copy link
Author

kolet commented Sep 16, 2022

my goal is to not receive the same ja3 .

would you mind droping a way of contact ? maybe discord i'd like to

i might need some help setting this one up .

@kolet
Copy link
Author

kolet commented Sep 16, 2022

You can use any http client and permute ciphers, tls version, curves (you dont need this lib) it will produce random ja3. The goal of profile here is to simulate well known browsers.

So it depends of your goals, if you want to spoof browser ja3, it's wrong to do random, each (one or many) version use the exact same ja3 on every request - having random / not matching ja3 is suspicious. That's why the exemple is always returning the same.

If it's for other purpose, then ok

how do i use permute cipher and curves ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants