Skip to content

Emulate TLS-Fingerprinting Using JA3 and JA3s on Network Namespaces and capture the Network traffic which is going throw Namespaces.

Notifications You must be signed in to change notification settings

Megatrone750/Emulate-TLS-Fingerprinting-on-Network-Namespaces

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Emulate TLS Fingerprinting On Network Namespaces Using Ja3/Ja3s & Mercury

Run Locally

Clone the project

Go to the project directory

  cd my-project

Install dependencies

  sudo apt install iperf3
  sudo apt install openssl -y
  sudo apt install ja3
  sudo apt install wireshark

First Go into sudo mode

  sudo su

Run script to make the network

  ./name_s.sh

Screenshots

Emulate_TLS

Running the Project

open two terminal

In First Terminal go in Red bash

  ip netns exec red bash

In Second Terminal go in Blue bash

  ip netns exec blue bash

Open wireshark in Red (client) choose ethred interface start capturing packet

  wireshark 

Make Blue as Server using iperf at port 443

  iperf3 -s -p 443

In Red connect to Blue (server)

  openssl s_client -connect 10.0.2.2:443

wireshark file save in .pcap file format

so in this you will get client hello msg which will helpful for calculating tls fingerprint

using ja3 we can calculate fingerprint

  ja3.py filename.sh

About

Emulate TLS-Fingerprinting Using JA3 and JA3s on Network Namespaces and capture the Network traffic which is going throw Namespaces.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published