""ET INFO Possible JARM Fingerprinting Client Hello via tls1_3_forward""
SID: 2036696
Revision: 1
Class Type: misc-activity
Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2022_05_25, deployment Perimeter, deployment SSLDecrypt, signature_severity Informational, updated_at 2022_05_25
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: any
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
-
Value: "|00 16 00 33 00 67 c0 9e c0 a2 00 9e 00 39 00 6b c0 9f c0 a3 00 9f 00 45 00 be 00 88 00 c4 00 9a c0 08 c0 09 c0 23 c0 ac c0 ae c0 2b c0 0a c0 24 c0 ad c0 af c0 2c c0 72 c0 73 cc a9 13 02 13 01 cc 14 c0 07 c0 12 c0 13 c0 27 c0 2f c0 14 c0 28 c0 30 c0 60 c0 61 c0 76 c0 77 cc a8 13 05 13 04 13 03 cc 13 c0 11 00 0a 00 2f 00 3c c0 9c c0 a0 00 9c 00 35 00 3d c0 9d c0 a1 00 9d 00 41 00 ba 00 84 00 c0 00 07 00 04 00 05|"
-
Value: "|02|hq|03|h2c|02|h2|06|spdy/3|06|spdy/2|06|spdy/1|08|http/1.1|08|http/1.0|08|http/0.9"
-
Value: "|03 04 03 03 03 02 03 01|"
Within:
PCRE:
Special Options:
- fast_pattern