Tool for fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage :-) Its main objective is to provide unique representations (fingerprints) of malware requests, which help in their identification. Unique means here that each fingerprint should be seen only in one particular malware family, yet one family can have multiple fingerprints. Hfinger represents the request in a shorter form than printing the whole request, but still human interpretable. Hfinger can be used in manual malware analysis but also in sandbox systems or SIEMs. The generated fingerprints are useful for grouping requests, pinpointing requests to particular malware families, identifying different operations of one family, or discovering unknown malicious requests omitted by other security systems but which share fingerprint. An academic paper accompanies work on this tool, describing, for example, the motivation of design choices, and the evaluation of the tool compared to p0f, FATT, and Mercury.
Common questions about Hfinger including features, pricing, alternatives, and user reviews.
Hfinger is Tool for fingerprinting malware HTTP requests. It is a Security Operations solution designed to help security teams with Fingerprinting.
Hfinger is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/CERT-Polska/hfinger/ for download and installation instructions.
Popular alternatives to Hfinger include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Hfinger is for security teams and organizations that need Fingerprinting. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Collaborative case management platform for incident response and investigation
Malware analysis platform for detecting and analyzing threats via sandbox
Malware scanning tool for DFIR using 40+ engines from ReversingLabs