<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[ICYMI: Seth&#x27;s walkthrough on JA4 fingerprinting in Zeek covers JA4, JA4S, JA4H, JA4T, JA4SSH, and JA4D with installation and use cases.]]></title><description><![CDATA[<p>ICYMI: Seth's walkthrough on JA4 fingerprinting in Zeek covers JA4, JA4S, JA4H, JA4T, JA4SSH, and JA4D with installation and use cases.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://zeek.org/2026/01/how-to-use-ja4-network-fingerprints-in-zeek/" title="Zeek: How to Use JA4 Network Fingerprints in Zeek">
<img src="https://zeek.org/wp-content/uploads/2026/01/8JA4D.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://zeek.org/2026/01/how-to-use-ja4-network-fingerprints-in-zeek/">
Zeek: How to Use JA4 Network Fingerprints in Zeek
</a>
</h5>
<p class="card-text line-clamp-3">Learn how to use JA4 network fingerprinting in Zeek to identify client and server software, detect malware, and track behavior across encrypted connections without requiring decryption. Network fingerprinting helps identify client and server software without decrypting traffic or relying on IP addresses that rotate constantly. JA4, a family of fingerprinting methods released by FoxIO, expands…</p>
</div>
<a href="https://zeek.org/2026/01/how-to-use-ja4-network-fingerprints-in-zeek/" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://i0.wp.com/zeek.org/wp-content/uploads/2024/03/cropped-zeek-favicon-1.png?fit=32%2C32&amp;ssl=1" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />







<p class="d-inline-block text-truncate mb-0">Zeek <span class="text-secondary">(zeek.org)</span></p>
</a>
</div><p></p><p><a href="https://infosec.exchange/tags/Zeek" rel="tag">#<span>Zeek</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" rel="tag">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/OpenSource" rel="tag">#<span>OpenSource</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/438/483/763/989/956/original/ff077ed39b094d4b.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/a284ed78-df98-4ef2-94ca-61f1e5c0044c/icymi-seth-s-walkthrough-on-ja4-fingerprinting-in-zeek-covers-ja4-ja4s-ja4h-ja4t-ja4ssh-and-ja4d-with-installation-and-use-cases.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:13:14 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a284ed78-df98-4ef2-94ca-61f1e5c0044c.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 20 Apr 2026 18:38:55 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to ICYMI: Seth&#x27;s walkthrough on JA4 fingerprinting in Zeek covers JA4, JA4S, JA4H, JA4T, JA4SSH, and JA4D with installation and use cases. on Mon, 20 Apr 2026 18:52:12 GMT]]></title><description><![CDATA[<p><span><a href="/user/zeek%40infosec.exchange">@<span>zeek</span></a></span> While JA4 is a valuable addition, its effectiveness can be limited by widespread TLS encryption of the initial Client Hello.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.vir.group/users/newsgroup/statuses/116438540781935802</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.vir.group/users/newsgroup/statuses/116438540781935802</guid><dc:creator><![CDATA[newsgroup@social.vir.group]]></dc:creator><pubDate>Mon, 20 Apr 2026 18:52:12 GMT</pubDate></item></channel></rss>