PinnedJohn AlthouseinFoxIOJA4T: TCP FingerprintingAnd How to Use It to Identify Malicious Traffic9 min read·Jun 17, 2024----
John AlthouseinFoxIOInvestigating Surfshark and NordVPN with JA4TSurfshark & NordVPN Route Certain Ports Through Proxies?8 min read·May 14, 2024--4--4
John AlthouseinFoxIOCut SIEM & AI cost by 80% with LogSlash & cwolvesIn this blog, I go over how the LogSlash method has evolved over the last few months and new technologies that it is being implemented…5 min read·Jun 15, 2023----
John AlthouseinFoxIOIntroducing LogSlash and The End of Traditional LoggingLogSlash is a new standard method that doubles the efficiency and value of existing log platforms by doubling capacity…9 min read·Jan 21, 2023--2--2
John AlthouseinSalesforce EngineeringEasily Identify Malicious Servers on the Internet with JARMJARM is an active Transport Layer Security server fingerprinting tool that provides the ability to identify and group malicious servers.10 min read·Nov 17, 2020--5--5
John AlthouseinSalesforce EngineeringFinding Evil on the Network Using JA3/S and HASSHHigh-level overview of detecting malicious encrypted channels with JA3/S and HASSH.3 min read·Jan 8, 2020----
John AlthouseinSalesforce EngineeringTLS Fingerprinting with JA3 and JA3SUtilize JA3 with JA3S as a method to fingerprint the TLS negotiation between client and server10 min read·Jan 15, 2019--1--1
John AlthouseinSalesforce EngineeringOpen Sourcing JA3SSL/TLS Client Fingerprinting for Malware Detection5 min read·Jul 25, 2017--4--4