Skip to main content

Fingerprint TLS implementations

Project description

# TLSprint

Fingerprint TLS implementations using state machines inferred by [StateLearner](https://github.com/jderuiter/statelearner/). StateLearner can learn state machines for (in this case TLS) implementations using a black-box approach. Different implementations can have a different state machine, which makes it possible to differentiate them. By combining these state machines into a single tree, and then probing a live implementation, tlsprint makes it possible to fingerprint the TLS implementation running on the target.

## Installation

Install the latest release from PyPi:

`shell pip install tlsprint `

## Learn

Note: This step is optional, a model.p is included in the distribution, which contains a model created using 27 unique state machines, representing 283 different TLS implementations. For the full list of implementations, check the models directory in the repository.

After state machines are inferred using StateLearner, run

`shell tlsprint learn <statelearner_output_dir> model.p `

to merge all models together into a single tree. This tree is returned as a pickled networkx graph, and is required for the identify step.

## Identify

When using the default model, identifying the TLS implementation on a target can be done be running

`shell tlsprint identify <target> `

This defaults to port 443, a custom port can be specified by adding –target-port <port>.

The command returns a list of possible implementations. All these implementations share the same model, meaning tlsprint cannot further specify the exact implementation.

Passing –graph-dir <output> to the identify command, will write DOT files for all intermediate versions of the model tree. This can be insightful to understand what tlsprint is doing.

If you learned a custom model using the learn command, you can override the default model using –model <filename>.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tlsprint-0.1.0.tar.gz (11.8 MB view details)

Uploaded Source

Built Distribution

tlsprint-0.1.0-py3-none-any.whl (11.8 MB view details)

Uploaded Python 3

File details

Details for the file tlsprint-0.1.0.tar.gz.

File metadata

  • Download URL: tlsprint-0.1.0.tar.gz
  • Upload date:
  • Size: 11.8 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.12.1 pkginfo/1.5.0.1 requests/2.21.0 setuptools/39.0.1 requests-toolbelt/0.8.0 tqdm/4.29.0 CPython/3.7.2

File hashes

Hashes for tlsprint-0.1.0.tar.gz
Algorithm Hash digest
SHA256 24840c7dbb0de04008202783259a16d4c76d5ded01b6bb576a17ba9dc56051ba
MD5 ae8401431ac4d22725e0260e03204e54
BLAKE2b-256 3c2042b2e03163f3c7ea0ccd895e74f745859242a5f73f9a5745fd8752d81565

See more details on using hashes here.

File details

Details for the file tlsprint-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: tlsprint-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 11.8 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.12.1 pkginfo/1.5.0.1 requests/2.21.0 setuptools/39.0.1 requests-toolbelt/0.8.0 tqdm/4.29.0 CPython/3.7.2

File hashes

Hashes for tlsprint-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 0840f109d03ca94b53b67362a8f3222e2d54d2d4d3eace552dd88c738321cebe
MD5 1cc1cd77fe237546da93ef3d799210f8
BLAKE2b-256 b0390d25cc88718c4cbaf6b00fc074e8d607241b30bafe72c9b025c69d0e6a5d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page