
References
[1] https://securitytrails.com/blog/jarm-fingerprinting-tool
[2] https://www.exoprise.com/2019/07/29/monitor-ssl-expiration-spoofing-changes/
[3] https://www.cloudflare.com/en-gb/learning/ssl/what-happens-in-a-tls-handshake/
[4] https://engineering.salesforce.com/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a
[5] https://blog.cobaltstrike.com/2020/12/08/a-red-teamer-plays-with-jarm/
[6] https://www.researchgate.net/figure/TLS-handshake-protocol_fig1_298065605
[7] https://medium.com/cu-cyber/impersonating-ja3-fingerprints-b9f555880e42
[8] https://tarshpartnership.co.uk/career-advice/interview-tips-whats-your-biggest-weakness/
[9] https://github.com/CUCyber/ja3transport
[10] https://engineering.salesforce.com/tls-fingerprinting-with-ja3-and-ja3s-247362855967
[11] https://github.com/PaloAltoNetworks/pyjarm
[12] https://cucyber.net/
[13] http://draw.io/
[14 ]https://github.com/cedowens/C2-JARM