PinnedIntroducing EVA — Employee Verification AppThe solution to Employee AI / Voice PhishingOct 141Oct 141
PinnedPublished inFoxIOJA4T: TCP FingerprintingAnd How to Use It to Identify Malicious TrafficJun 17Jun 17
Published inFoxIOInvestigating Surfshark and NordVPN with JA4TSurfshark & NordVPN Route Certain Ports Through Proxies?May 144May 144
Published inFoxIOCut SIEM & AI cost by 80% with LogSlash & cwolvesIn this blog, I go over how the LogSlash method has evolved over the last few months and new technologies that it is being implemented…Jun 15, 2023Jun 15, 2023
Published inFoxIOIntroducing LogSlash and The End of Traditional LoggingLogSlash is a new standard method that doubles the efficiency and value of existing log platforms by doubling capacity…Jan 21, 20232Jan 21, 20232
Published inSalesforce EngineeringEasily Identify Malicious Servers on the Internet with JARMJARM is an active Transport Layer Security server fingerprinting tool that provides the ability to identify and group malicious servers.Nov 17, 20205Nov 17, 20205
Published inSalesforce EngineeringFinding Evil on the Network Using JA3/S and HASSHHigh-level overview of detecting malicious encrypted channels with JA3/S and HASSH.Jan 8, 2020Jan 8, 2020
Published inSalesforce EngineeringTLS Fingerprinting with JA3 and JA3SUtilize JA3 with JA3S as a method to fingerprint the TLS negotiation between client and serverJan 15, 20191Jan 15, 20191
Published inSalesforce EngineeringOpen Sourcing JA3SSL/TLS Client Fingerprinting for Malware DetectionJul 25, 20174Jul 25, 20174