I tried out JA3 (a Python program to fingerprint TLS clients) with a 1GB pcap file from my server. It was fast (less than 1 minute), but I had to add some error handling to skip packets it would crash on.
I did not identify a lot of client HELLO packets with the JSON fingerprint database: around 5%.
[…] Quickpost: Trying Out JA3 […]
Pingback by Overview of Content Published In July | Didier Stevens — Tuesday 1 August 2017 @ 21:53
Would you mind telling me what you did to get the file to process… what was erroring?
Comment by Cornholio — Tuesday 24 April 2018 @ 22:56
[…] year ago I tried out JA3. Time for a new […]
Pingback by Quickpost: Revisting JA3 | Didier Stevens — Saturday 18 August 2018 @ 0:00
It’s fixed in the latest release
Comment by Didier Stevens — Sunday 19 August 2018 @ 10:57