junit / requests-ja3

Modifying Python's requests module to spoof a ja3 fingerprint

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

requests-ja3

Modifying Python's requests module to spoof a ja3 fingerprint

(Since the repo seems to be getting some external attention, I want to clarify that this is experimental and not currently in a working state. Thank you!)

TO-DO LIST

  • decoder: parse string version of ja3
  • patcher: find and replace usages of ssl module in an imported requests module
  • monitor: dump ja3 off network using scapy
    • some inconsistency here? some fields don't seem to match ja3 reported by ja3er
    • not sure how to further debug this, client hello packet data from wireshark matches scapy
  • imitate: fake ssl module with customizable ja3
    • dummy C extension with setup.py and portable compiler setup
    • dummy pybind11 + cppimport extension (moved to ctypes)
    • ability to verify fakessl against real ssl module can't inspect pybind11 method signatures yet
    • dummy SSLSocket class
    • customized openssl compile options + linkage against C extension
    • usage of compiled openssl in SSLSocket class
    • ssl.wrap_socket at minimum
    • other ssl functions used by requests/urllib3
  • tests using ja3s from common browsers

REFERENCES

JA3 specification: https://github.com/salesforce/ja3/blob/master/README.md

About

Modifying Python's requests module to spoof a ja3 fingerprint


Languages

Language:Python 64.5%Language:C++ 25.5%Language:C 10.0%