Skip to main content

JARM

Download With Dependencies

This pack introduces the JARM indicator type and commands for generating new JARM fingerprints of servers using TLS.

Overview

The JARM pack for Cortex XSOAR leverages a the pyJARM library for generating JARM fingerprints. pyJARM is based on the original Salesforce research and implementation for fingerprinting servers using TLS. JARM is an active Transport Layer Security (TLS) server fingerprinting tool.
JARM can be useful in a number of use-cases including:

  1. Verifying that a group of servers share the same TLS configuration.
  2. Comparing JARM fingerprints to the fingerprints of known malicious actors to identify servers that may belong to a specific threat actor.
  3. Identifying whether your own servers are using the expected TLS configuration by comparing with a Known-good server.
    JARM is an active fingerprinting tool, which means that generating a JARM fingerprint requires making multiple connections to the target server. Specifically, the JARM fingerprinting uses 10 custom crafted TLS client hello packets to generate the raw information necessary for fingerprinting.
    You can read more about how JARM works here.

JARM Indicator Type

This pack includes the JARM indicator type with its own layout.

The JARM fingerprint is a 62 digit hexadecimal string and is compatible with auto-extract.

Indicator Fields

This following are the indicator fields for the JARM indicator layout.

  • JARM Fingerprint (primary key)
  • JARM Hosts (the hosts that originated this fingerprint). It is a tag field comprised of IP/FQDN:Port

Integrations

This pack includes an integration that implements the following Command.

  • jarm-fingerprint - Accepts a host (FQDN or IP) and a port to attempt to generate a JARM fingerprint for.

Overview

The JARM pack for Cortex XSIAM leverages a the pyJARM library for generating JARM fingerprints. pyJARM is based on the original Salesforce research and implementation for fingerprinting servers using TLS. JARM is an active Transport Layer Security (TLS) server fingerprinting tool.
JARM can be useful in a number of use-cases including:

  1. Verifying that a group of servers share the same TLS configuration.
  2. Comparing JARM fingerprints to the fingerprints of known malicious actors to identify servers that may belong to a specific threat actor.
  3. Identifying whether your own servers are using the expected TLS configuration by comparing with a Known-good server.
    JARM is an active fingerprinting tool, which means that generating a JARM fingerprint requires making multiple connections to the target server. Specifically, the JARM fingerprinting uses 10 custom crafted TLS client hello packets to generate the raw information necessary for fingerprinting.
    You can read more about how JARM works here.

JARM Indicator Type

This pack includes the JARM indicator type with its own layout.

The JARM fingerprint is a 62 digit hexadecimal string and is compatible with auto-extract.

Indicator Fields

This following are the indicator fields for the JARM indicator layout.

  • JARM Fingerprint (primary key)
  • JARM Hosts (the hosts that originated this fingerprint). It is a tag field comprised of IP/FQDN:Port

Integrations

This pack includes an integration that implements the following Command.

  • jarm-fingerprint - Accepts a host (FQDN or IP) and a port to attempt to generate a JARM fingerprint for.

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

Supported ByDeveloper
CreatedFebruary 28, 2021
Last ReleaseNovember 19, 2024
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.