
Malware Detection with JA3 and osquery
Have you ever wondered how you can detect malware and other suspicious activity that uses TLS, without having to actually intercept or terminate the connection? JA3, a method to fingerprint the SSL/TLS client, is a great way to do that.
In this webinar, we will extend osquery to calculate a JA3 fingerprint for SSL/TLS clients and create an allowlist of allowed (known) clients. With the use of the osquery daemon, we'll monitor and detect when any malicious (i.e. non-allowlisted) client is active on our machine.
Sign up today and view this on-demand webinar!
Hosted By
Julian Wayte
Julian Wayte
Julian Wayte is a Security Solutions Engineer for Uptycs. In this role, he helps organizations architect security solutions - based on endpoint telemetry and automated workflows – in order to solve a variety of security use cases. Julian loves working with and teaching osquery. He has worked for 20 years in various customer facing, technical, IT roles helping organizations manage and secure their data.
FAQ's:
What is osquery?
What is JA3?
How can I get some additional osquery resources?