Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Extend c2 module to generate malicious JARM fingerprints #27

Open
chrisforce1 opened this issue Jan 18, 2021 · 0 comments
Open

Extend c2 module to generate malicious JARM fingerprints #27

chrisforce1 opened this issue Jan 18, 2021 · 0 comments
Assignees
Labels
enhancement New feature or request

Comments

@chrisforce1
Copy link
Contributor

It seems we can spoof JARM server fingerprints, i.e.

https://grimminck.medium.com/spoofing-jarm-signatures-i-am-the-cobalt-strike-server-now-a27bd549fc6b

The idea would be to set up a TLS server and have flightsim interact with it to generate the bad JARM fingerprint.

@chrisforce1 chrisforce1 added the enhancement New feature or request label Jan 18, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants