{"id":1099,"date":"2023-02-10T14:36:06","date_gmt":"2023-02-10T06:36:06","guid":{"rendered":"https:\/\/www.xlogin.us\/help\/docs\/fingerprint-introduction\/xlogin-browser-ssl-fingerprint\/"},"modified":"2023-02-14T11:23:32","modified_gmt":"2023-02-14T03:23:32","slug":"xlogin-browser-ssl-fingerprint","status":"publish","type":"docs","link":"https:\/\/www.xlogin.us\/help\/docs\/fingerprint-introduction\/xlogin-browser-ssl-fingerprint\/","title":{"rendered":"XLogin Browser SSL Fingerprint"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">You can&nbsp;set the number and order of cipher suites&nbsp;in SSL fingerprint setting, which can withstand&nbsp;some websites that use the JA3 method to detect SSL fingerprints.&nbsp;Generally, each browser has a relatively fixed SSL fingerprint. When doing multi-account or anti-detection&nbsp;projects, the change of the SSL fingerprint may play a certain role. However, if you do not know much about what is SSL fingerprint, it is recommended not to&nbsp;set it randomly, otherwise&nbsp;it may be counterproductive.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>It is generally recommended to&nbsp;<strong>click the Chrome SSL button<\/strong>, so that you can set the fingerprint to be consistent with Chrome. For some websites that use SSL detection, it is more friendly to use the official version of Chrome fingerprint.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"696\" src=\"https:\/\/www.xlogin.us\/help\/wp-content\/uploads\/2023\/02\/QQ\u622a\u56fe20230210144130-1.png\" alt=\"\" class=\"wp-image-1631\" srcset=\"https:\/\/www.xlogin.us\/help\/wp-content\/uploads\/2023\/02\/QQ\u622a\u56fe20230210144130-1.png 999w, https:\/\/www.xlogin.us\/help\/wp-content\/uploads\/2023\/02\/QQ\u622a\u56fe20230210144130-1-300x209.png 300w, https:\/\/www.xlogin.us\/help\/wp-content\/uploads\/2023\/02\/QQ\u622a\u56fe20230210144130-1-768x535.png 768w\" sizes=\"auto, (max-width: 999px) 100vw, 999px\" \/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>JA3<\/strong>&nbsp;is a method for creating SSL\/TLS client fingerprints that should be easy to generate on any platforms&nbsp;and can be shared&nbsp;easily&nbsp;for&nbsp;Threat Intelligence.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"478\" height=\"268\" src=\"https:\/\/www.xlogin.us\/help\/wp-content\/uploads\/2023\/02\/2.gif\" alt=\"\" class=\"wp-image-1102\"\/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>What is SSL fingerprint?<\/strong>&nbsp;Genarally, it can be said that each browser has a fixed SSL fingerprint.<br>The JA3 method is to gather the decimal values of the bytes for the following fields in the Server Hello packet: Version, Accepted Cipher, and List of Extensions, Elliptic Curves, and Elliptic Curve Formats.&nbsp;Using a \u201c,\u201d to delimit each field and a \u201c-\u201d to delimit each value in each field, then concatenates those values together in order.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"649\" src=\"https:\/\/www.xlogin.us\/help\/wp-content\/uploads\/2023\/02\/3-1.jpg\" alt=\"\" class=\"wp-image-1632\" srcset=\"https:\/\/www.xlogin.us\/help\/wp-content\/uploads\/2023\/02\/3-1.jpg 700w, https:\/\/www.xlogin.us\/help\/wp-content\/uploads\/2023\/02\/3-1-300x278.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>Example Client Hello packet as viewed in Wireshark<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>The field order is as follows:<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\">TLSVersion,Ciphers,Extensions,EllipticCurves,EllipticCurvePointFormats<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong>Example:<\/strong>&nbsp;769,47\u201353\u20135\u201310\u201349161\u201349162\u201349171\u201349172\u201350\u201356\u201319\u20134,0\u201310\u201311,23\u201324\u201325,0<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>If there are no TLS Extensions in the Client Hello, the fields are left empty.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">769,4\u20135\u201310\u20139\u2013100\u201398\u20133\u20136\u201319\u201318\u201399,,,<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>These strings are then MD5 hashed to produce an easily consumable and shareable 32 character fingerprint. This is the JA3 TLS Client Fingerprint.<br><\/p>\n\n\n\n<p class=\"has-medium-font-size\">769,47\u201353\u20135\u201310\u201349161\u201349162\u201349171\u201349172\u201350\u201356\u201319\u20134,0\u201310\u201311,23\u201324\u201325,0 \u2192 ada70206e40642a3e4461f35503241d5<br>769,4\u20135\u201310\u20139\u2013100\u201398\u20133\u20136\u201319\u201318\u201399,,, \u2192 de350869b8c85de67a350c8d186f11e6<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>We also needed to introduce some code to account for Google\u2019s GREASE (Generate Random Extensions And Sustain Extensibility) as described here. Google uses this as a mechanism to prevent extensibility failures in the TLS ecosystem. JA3 ignores these values completely to ensure that programs utilizing GREASE can still be identified with a single JA3 hash.<br><br><br><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/browserleaks.com\/ssl\" data-type=\"URL\" data-id=\"https:\/\/browserleaks.com\/ssl\" target=\"_blank\">Websites<\/a> that can be used for SSL fingerprinting test<\/strong>.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><br><strong>Conclusion<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br>JA3 and JA3S are&nbsp;security analysis methods&nbsp;based on TLS fingerprints. The JA3 fingerprints&nbsp;can identify the way&nbsp;how the client application communicates over TLS&nbsp;and the JA3S&nbsp;fingerprints&nbsp;can identify&nbsp;the server response. If combine these 2 methods,&nbsp;they essentially create a fingerprint of the cryptographic negotiation between client and server. While TLS-based detection methods are not always a silver bullet or&nbsp;a guaranteed mapping to client applications, they are always valuable as a pivot point for analysis.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><strong><a href=\"https:\/\/xlogin.us\" data-type=\"URL\" data-id=\"https:\/\/xlogin.us\" target=\"_blank\" rel=\"noreferrer noopener\">XLogin<\/a>&nbsp;<\/strong>designs&nbsp;the SSL custom setting method,&nbsp;mainly to change the JA3 fingerprint of the browser. Although it is not comprehensive,&nbsp;it is very simple and efficient. Hope to help some users who pursue perfectionism. At the same time, hope&nbsp;users provide us good&nbsp;suggestions and help.<\/p>\n\n\n\n<p><br><br><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><br><\/p>\n","protected":false},"featured_media":0,"parent":780,"menu_order":38,"comment_status":"closed","ping_status":"closed","template":"","doc_tag":[],"class_list":["post-1099","docs","type-docs","status-publish","hentry"],"comment_count":0,"_links":{"self":[{"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/docs\/1099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/types\/docs"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/comments?post=1099"}],"version-history":[{"count":2,"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/docs\/1099\/revisions"}],"predecessor-version":[{"id":1633,"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/docs\/1099\/revisions\/1633"}],"up":[{"embeddable":true,"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/docs\/780"}],"next":[{"title":"Port Scan Protection","link":"https:\/\/www.xlogin.us\/help\/docs\/fingerprint-introduction\/port-scan-protection\/","href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/docs\/1105"}],"prev":[{"title":"Geolocation Introduction","link":"https:\/\/www.xlogin.us\/help\/docs\/fingerprint-introduction\/geolocation-introduction\/","href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/docs\/1095"}],"wp:attachment":[{"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/media?parent=1099"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/www.xlogin.us\/help\/wp-json\/wp\/v2\/doc_tag?post=1099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}