{"id":1595,"date":"2022-12-09T10:40:00","date_gmt":"2022-12-09T02:40:00","guid":{"rendered":"https:\/\/vmlogin.us\/help\/?p=1595"},"modified":"2022-12-09T10:41:26","modified_gmt":"2022-12-09T02:41:26","slug":"vmlogin-browser-ssl-fingerprint","status":"publish","type":"post","link":"https:\/\/www.vmlogin.us\/help\/fingerprint\/ssl.html","title":{"rendered":"VMLogin Browser SSL Fingerprint"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">You can&nbsp;set the number and order of cipher suites&nbsp;in SSL fingerprint setting, which can withstand&nbsp;some websites that use the JA3 method to detect SSL fingerprints.&nbsp;Generally, each browser has a relatively fixed SSL fingerprint. When doing multi-account or anti-detection&nbsp;projects, the change of the SSL fingerprint may play a certain role. However, if you do not know much about what is SSL fingerprint, it is recommended not to&nbsp;set it randomly, otherwise&nbsp;it may be counterproductive.<br><br>It is generally recommended to <strong>click the Chrome SSL button<\/strong>, so that you can set the fingerprint to be consistent with Chrome. For some websites that use SSL detection, it is more friendly to use the official version of Chrome fingerprint.<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"687\" src=\"https:\/\/www.vmlogin.us\/help\/wp-content\/uploads\/2022\/12\/en-1-4.png\" alt=\"\" class=\"wp-image-1597\" srcset=\"https:\/\/www.vmlogin.us\/help\/wp-content\/uploads\/2022\/12\/en-1-4.png 998w, https:\/\/www.vmlogin.us\/help\/wp-content\/uploads\/2022\/12\/en-1-4-300x207.png 300w, https:\/\/www.vmlogin.us\/help\/wp-content\/uploads\/2022\/12\/en-1-4-768x529.png 768w\" sizes=\"auto, (max-width: 998px) 100vw, 998px\" \/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>JA3<\/strong> is a method for creating SSL\/TLS client fingerprints that should be easy to generate on any platforms&nbsp;and can be shared&nbsp;easily&nbsp;for&nbsp;Threat Intelligence.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"478\" height=\"268\" src=\"https:\/\/www.vmlogin.us\/help\/wp-content\/uploads\/2022\/12\/2.gif\" alt=\"\" class=\"wp-image-1598\"\/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>What is SSL fingerprint?<\/strong> Genarally, it can be said that each browser has a fixed SSL fingerprint.<br>The JA3 method is to gather the decimal values of the bytes for the following fields in the Server Hello packet: Version, Accepted Cipher, and List of Extensions, Elliptic Curves, and Elliptic Curve Formats.&nbsp;Using a \u201c,\u201d to delimit each field and a \u201c-\u201d to delimit each value in each field, then concatenates those values together in order.<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"649\" src=\"https:\/\/www.vmlogin.us\/help\/wp-content\/uploads\/2022\/12\/3.jpg\" alt=\"\" class=\"wp-image-1599\" srcset=\"https:\/\/www.vmlogin.us\/help\/wp-content\/uploads\/2022\/12\/3.jpg 700w, https:\/\/www.vmlogin.us\/help\/wp-content\/uploads\/2022\/12\/3-300x278.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p><br><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Example Client Hello packet as viewed in Wireshark<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>The field order is as follows:<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\">TLSVersion,Ciphers,Extensions,EllipticCurves,EllipticCurvePointFormats<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Example:<\/strong> 769,47\u201353\u20135\u201310\u201349161\u201349162\u201349171\u201349172\u201350\u201356\u201319\u20134,0\u201310\u201311,23\u201324\u201325,0<\/p>\n\n\n\n<p class=\"has-medium-font-size\">If there are no TLS Extensions in the Client Hello, the fields are left empty.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">769,4\u20135\u201310\u20139\u2013100\u201398\u20133\u20136\u201319\u201318\u201399,,,<\/p>\n\n\n\n<p class=\"has-medium-font-size\">These strings are then MD5 hashed to produce an easily consumable and shareable 32 character fingerprint. This is the JA3 TLS Client Fingerprint.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">769,47\u201353\u20135\u201310\u201349161\u201349162\u201349171\u201349172\u201350\u201356\u201319\u20134,0\u201310\u201311,23\u201324\u201325,0 \u2192 ada70206e40642a3e4461f35503241d5<br>769,4\u20135\u201310\u20139\u2013100\u201398\u20133\u20136\u201319\u201318\u201399,,, \u2192 de350869b8c85de67a350c8d186f11e6<\/p>\n\n\n\n<p class=\"has-medium-font-size\">We also needed to introduce some code to account for Google\u2019s GREASE (Generate Random Extensions And Sustain Extensibility) as described here. Google uses this as a mechanism to prevent extensibility failures in the TLS ecosystem. JA3 ignores these values completely to ensure that programs utilizing GREASE can still be identified with a single JA3 hash.<br><strong>Websites that can be used for SSL fingerprinting tests:&nbsp;<\/strong><a rel=\"noreferrer noopener\" href=\"https:\/\/browserleaks.com\/ssl\" target=\"_blank\">https:\/\/browserleaks.com\/ssl<\/a><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>Conclusion<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\">JA3 and JA3S are\u00a0security analysis methods\u00a0based on TLS fingerprints. The JA3 fingerprints\u00a0can identify the way\u00a0how the client application communicates over TLS\u00a0and the JA3S\u00a0fingerprints\u00a0can identify\u00a0the server response. If combine these 2 methods,\u00a0they essentially create a fingerprint of the cryptographic negotiation between client and server. While TLS-based detection methods are not always a silver bullet or\u00a0a guaranteed mapping to client applications, they are always valuable as a pivot point for analysis.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.vmlogin.us\" data-type=\"URL\" data-id=\"https:\/\/www.vmlogin.us\" target=\"_blank\">VMLogin <\/a><\/strong>designs\u00a0the SSL custom setting method,\u00a0mainly to change the JA3 fingerprint of the browser. Although it is not comprehensive,\u00a0it is very simple and efficient. Hope to help some users who pursue perfectionism. At the same time, hope\u00a0users provide us good\u00a0suggestions and help.<\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You can&nbsp;set the number and order of cipher suites&#038; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-1595","post","type-post","status-publish","format-standard","hentry","category-fingerprint"],"_links":{"self":[{"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/posts\/1595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/comments?post=1595"}],"version-history":[{"count":4,"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/posts\/1595\/revisions"}],"predecessor-version":[{"id":1602,"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/posts\/1595\/revisions\/1602"}],"wp:attachment":[{"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/media?parent=1595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/categories?post=1595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vmlogin.us\/help\/wp-json\/wp\/v2\/tags?post=1595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}